Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
800399031-18.11.2024.pdf.exe

Overview

General Information

Sample name:800399031-18.11.2024.pdf.exe
Analysis ID:1560892
MD5:54a5436bb5bf3977e98eda5ce6f8e8d2
SHA1:5aed6273fe965d5e0c41b0e934aa92099327e4da
SHA256:efbc15ccbe9e7b1f1648d94c5e38e3149bff5d33ad93c0a56e68db648050509a
Tags:AlphaBankexeFakePDFgeoGRCuser-NDA0E
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 800399031-18.11.2024.pdf.exe (PID: 2104 cmdline: "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe" MD5: 54A5436BB5BF3977E98EDA5CE6F8E8D2)
    • 800399031-18.11.2024.pdf.exe (PID: 7160 cmdline: "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe" MD5: 54A5436BB5BF3977E98EDA5CE6F8E8D2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["oyo.work.gd:3142:1"], "Assigned name": "Host", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "ios", "Hide file": "Disable", "Mutex": "jkm-I9KENP", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "vlc", "Keylog folder": "pdf", "Keylog file max size": "100"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
      • 0x691e0:$a1: Remcos restarted by watchdog!
      • 0x69738:$a3: %02i:%02i:%02i:%03i
      • 0x69abd:$a4: * Remcos v
      00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmpREMCOS_RAT_variantsunknownunknown
      • 0x641e4:$str_a1: C:\Windows\System32\cmd.exe
      • 0x64160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x64160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
      • 0x63610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
      • 0x63e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
      • 0x6320c:$str_b2: Executing file:
      • 0x64328:$str_b3: GetDirectListeningPort
      • 0x63c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
      • 0x63e30:$str_b7: \update.vbs
      • 0x63234:$str_b9: Downloaded file:
      • 0x63220:$str_b10: Downloading file:
      • 0x632c4:$str_b12: Failed to upload file:
      • 0x642f0:$str_b13: StartForward
      • 0x64310:$str_b14: StopForward
      • 0x63dd8:$str_b15: fso.DeleteFile "
      • 0x63d6c:$str_b16: On Error Resume Next
      • 0x63e08:$str_b17: fso.DeleteFolder "
      • 0x632b4:$str_b18: Uploaded file:
      • 0x63274:$str_b19: Unable to delete:
      • 0x63da0:$str_b20: while fso.FileExists("
      • 0x63749:$str_c0: [Firefox StoredLogins not found]
      00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
      • 0x63100:$s1: \Classes\mscfile\shell\open\command
      • 0x63160:$s1: \Classes\mscfile\shell\open\command
      • 0x63148:$s2: eventvwr.exe
      Click to see the 9 entries
      SourceRuleDescriptionAuthorStrings
      0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpackWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x661e0:$a1: Remcos restarted by watchdog!
        • 0x66738:$a3: %02i:%02i:%02i:%03i
        • 0x66abd:$a4: * Remcos v
        2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpackREMCOS_RAT_variantsunknownunknown
          • 0x611e4:$str_a1: C:\Windows\System32\cmd.exe
          • 0x61160:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x61160:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
          • 0x60610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
          • 0x60e48:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
          • 0x6020c:$str_b2: Executing file:
          • 0x61328:$str_b3: GetDirectListeningPort
          • 0x60c08:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
          • 0x60e30:$str_b7: \update.vbs
          • 0x60234:$str_b9: Downloaded file:
          • 0x60220:$str_b10: Downloading file:
          • 0x602c4:$str_b12: Failed to upload file:
          • 0x612f0:$str_b13: StartForward
          • 0x61310:$str_b14: StopForward
          • 0x60dd8:$str_b15: fso.DeleteFile "
          • 0x60d6c:$str_b16: On Error Resume Next
          • 0x60e08:$str_b17: fso.DeleteFolder "
          • 0x602b4:$str_b18: Uploaded file:
          • 0x60274:$str_b19: Unable to delete:
          • 0x60da0:$str_b20: while fso.FileExists("
          • 0x60749:$str_c0: [Firefox StoredLogins not found]
          2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x691e0:$a1: Remcos restarted by watchdog!
          • 0x69738:$a3: %02i:%02i:%02i:%03i
          • 0x69abd:$a4: * Remcos v
          Click to see the 17 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe", CommandLine: "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe, NewProcessName: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe, OriginalFileName: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe", ProcessId: 2104, ProcessName: 800399031-18.11.2024.pdf.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-22T14:06:08.811190+010020365941Malware Command and Control Activity Detected192.168.2.449734154.216.20.1853142TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-11-22T14:06:11.450772+010028033043Unknown Traffic192.168.2.449736178.237.33.5080TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: oyo.work.gdAvira URL Cloud: Label: malware
          Source: 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["oyo.work.gd:3142:1"], "Assigned name": "Host", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "ios", "Hide file": "Disable", "Mutex": "jkm-I9KENP", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "vlc", "Keylog folder": "pdf", "Keylog file max size": "100"}
          Source: 800399031-18.11.2024.pdf.exeReversingLabs: Detection: 65%
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 7160, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: 800399031-18.11.2024.pdf.exeJoe Sandbox ML: detected
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,2_2_004315EC
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_33e242c5-c
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041A01B
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040B28E
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_0040838E
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_004087A0
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_00407848
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004068CD FindFirstFileW,FindNextFileW,2_2_004068CD
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040AA71
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00417AAB
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040AC78
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00406D28

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.4:49734 -> 154.216.20.185:3142
          Source: Malware configuration extractorURLs: oyo.work.gd
          Source: global trafficTCP traffic: 192.168.2.4:49734 -> 154.216.20.185:3142
          Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
          Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
          Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.4:49736 -> 178.237.33.50:80
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041936B InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,2_2_0041936B
          Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: oyo.work.gd
          Source: global trafficDNS traffic detected: DNS query: geoplugin.net
          Source: 800399031-18.11.2024.pdf.exe, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001457000.00000004.00000020.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001447000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705619618.0000000004FB0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.monotype.y
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00409340 SetWindowsHookExA 0000000D,0040932C,000000002_2_00409340
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040A65A
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,2_2_00414EC1
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,2_2_0040A65A
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,2_2_00409468

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 7160, type: MEMORYSTR

          Spam, unwanted Advertisements and Ransom Demands

          barindex
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041A76C SystemParametersInfoW,2_2_0041A76C

          System Summary

          barindex
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
          Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
          Source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 7160, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
          Source: initial sampleStatic PE information: Filename: 800399031-18.11.2024.pdf.exe
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,2_2_00414DB4
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_0244D5B40_2_0244D5B4
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_04A900230_2_04A90023
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_04A900400_2_04A90040
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E3E5F00_2_06E3E5F0
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E3A6210_2_06E3A621
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E3A6300_2_06E3A630
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E387180_2_06E38718
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E304000_2_06E30400
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E303F00_2_06E303F0
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E3AFE00_2_06E3AFE0
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E3AFCF0_2_06E3AFCF
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E38F880_2_06E38F88
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E38B410_2_06E38B41
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004251522_2_00425152
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004352862_2_00435286
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004513D42_2_004513D4
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0045050B2_2_0045050B
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004365102_2_00436510
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004316FB2_2_004316FB
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0043569E2_2_0043569E
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004437002_2_00443700
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004257FB2_2_004257FB
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004128E32_2_004128E3
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004259642_2_00425964
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041B9172_2_0041B917
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0043D9CC2_2_0043D9CC
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00435AD32_2_00435AD3
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00424BC32_2_00424BC3
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0043DBFB2_2_0043DBFB
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0044ABA92_2_0044ABA9
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00433C0B2_2_00433C0B
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00434D8A2_2_00434D8A
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0043DE2A2_2_0043DE2A
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041CEAF2_2_0041CEAF
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00435F082_2_00435F08
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: String function: 00402073 appears 51 times
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: String function: 00432B90 appears 53 times
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: String function: 00432525 appears 41 times
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1706986759.0000000007050000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1702079963.00000000008AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1706619328.0000000006DA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703021363.0000000002471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703021363.0000000002471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exeBinary or memory string: OriginalFilenamepqnq.exeP vs 800399031-18.11.2024.pdf.exe
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
          Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
          Source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 7160, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, Ka8i3heuLve4fNonOR.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, Ka8i3heuLve4fNonOR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, Ka8i3heuLve4fNonOR.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, Ka8i3heuLve4fNonOR.csSecurity API names: _0020.SetAccessControl
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, Ka8i3heuLve4fNonOR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, Ka8i3heuLve4fNonOR.csSecurity API names: _0020.AddAccessRule
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, N4RslqVwZi8SkrQt4i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, N4RslqVwZi8SkrQt4i.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@3/3@4/2
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,2_2_00415C90
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040E2E7 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,2_2_0040E2E7
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,2_2_00419493
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_00418A00
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\800399031-18.11.2024.pdf.exe.logJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMutant created: NULL
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\jkm-I9KENP
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 800399031-18.11.2024.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 800399031-18.11.2024.pdf.exeReversingLabs: Detection: 65%
          Source: unknownProcess created: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess created: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess created: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 800399031-18.11.2024.pdf.exeStatic file information: File size 1049088 > 1048576
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, Ka8i3heuLve4fNonOR.cs.Net Code: mSstQWwhpK System.Reflection.Assembly.Load(byte[])
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, Ka8i3heuLve4fNonOR.cs.Net Code: mSstQWwhpK System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041A8DA
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 0_2_06E3832E push eax; retf 0_2_06E3832F
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004000D8 push es; iretd 2_2_004000D9
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040008C push es; iretd 2_2_0040008D
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004542E6 push ecx; ret 2_2_004542F9
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0045B4FD push esi; ret 2_2_0045B506
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00432BD6 push ecx; ret 2_2_00432BE9
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00454C08 push eax; ret 2_2_00454C26
          Source: 800399031-18.11.2024.pdf.exeStatic PE information: section name: .text entropy: 7.9814858680694005
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, HfFRpTMKwKJ58wk6Eb.csHigh entropy of concatenated method names: 'Jexiq9cUuW', 'As4ihLpZV9', 'kfYugxZA24', 'EGVudq3AM8', 'B7dis3JUEw', 'lsNiA2wWUI', 'DQliXRimS1', 'OpGiYhyEOw', 'cfOivMOoj7', 'vFxiyA0N9P'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, zMEJFvkLIDjYHi3SSw.csHigh entropy of concatenated method names: 'DFURo8QPQG', 'kIQRPYqHg3', 'fhsB6GmLUr', 'lPJBnhHoH9', 'QkjBOvR73l', 'PF8BmeIMe2', 'r38Bl7goAs', 'PUpB4ouUfT', 'UEnB0TJ8pl', 'WWQB7qoOJg'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, ir1V3pXINhZmmC7Xxt.csHigh entropy of concatenated method names: 'rGP3VHZ5Q5', 'hvs3wqY1PB', 'MEJ31Jg1Uu', 'd7j3UBpFN0', 'sIl3nkbDY8', 'CnX3OLb0WM', 'qQf3lQ8Gav', 'i1L34cEngQ', 'Y8r37tgK7G', 'TYx3sKLmw4'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, p92b9bwrC97hSP69gL.csHigh entropy of concatenated method names: 'vCcBTQmWN5', 'GOCBHWfXqu', 'RXcBVjVILm', 'BiDBw3sSLD', 'LSCBJfep5x', 'nDXBKcd1Ee', 'PKnBi8qqr2', 'kJ2BuIlBUg', 'JD3BCrc1MU', 'NAVBIv0Eub'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, CEvZjQy61D297BuFoX.csHigh entropy of concatenated method names: 'ToString', 'EuMKskTR7Z', 'beqKUu5An6', 'R7GK6G3vao', 'xO3Knk17LO', 'LK9KOP7csy', 'hpdKmCBYGB', 'DkEKlHMSa8', 'TOYK4pavev', 's8aK0CP5nT'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, N4RslqVwZi8SkrQt4i.csHigh entropy of concatenated method names: 'gJTfY4l6Ni', 'iDVfvcMt8r', 'ey2fyUfW0U', 'r3PfbfZsNG', 'xJxfFOPM6X', 'd45fMqoXdD', 'xqMfpQhAlB', 'KrCfqTF7FV', 'hNZfr1FIj4', 'jyffh5ThQq'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, UqS5nfpPMymHgaZx2i.csHigh entropy of concatenated method names: 'yB1CJNpgGd', 'GnfCiZ6SJb', 'd4uCCbYytk', 'vT9CLFgVwo', 'cyoCaNBGn8', 'IEbC5lDQ3E', 'Dispose', 'X3iuW7jmk1', 'rGOufxyOhh', 'MUOuB51mdH'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, mpfoLP1bsqhTTncjAj.csHigh entropy of concatenated method names: 'esy2EnqZKK', 'kMw2fWLnUv', 'B0H2RcBfug', 'p8R2SfjfIb', 'e4R2emECbZ', 'L1iRFshk2I', 'NVaRMUCBKy', 'YcpRprNCdd', 'rbsRqQT5ex', 'wUZRrAMm39'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, Ka8i3heuLve4fNonOR.csHigh entropy of concatenated method names: 'dq9ZE1DJLV', 'nFnZW22l0v', 'zY6ZfFRe7K', 'XBMZBfKGMl', 'vZ3ZRWv6wM', 'HJDZ20cTOP', 'bu7ZSxOmUd', 'f2mZekCii2', 'dHJZj8SYvv', 'gGYZN25eX0'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, rALSNRr3BpBtYkLaPF.csHigh entropy of concatenated method names: 'ofKC1Je1ds', 'Uv9CUGJsqF', 'UOPC69SEJW', 'riuCnMqI7D', 'WK7CO84rxC', 'T6ZCm5qtpo', 'K1oCleNmDx', 'jmvC4MhPFr', 'BlAC0mMx7I', 'AxAC7r4OtA'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, ctcIsAdtKlODHvHmcHg.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ChlcCHFINR', 'mQDcICRcO5', 'JpQcLbBynH', 'yjlcc1h33d', 'GTucar6TYc', 'HRmc85sR0M', 'VKNc5RQk8p'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, FGPA5rdx7yYw0MaYL2Q.csHigh entropy of concatenated method names: 'ToString', 'PBjLVkTQjK', 'GfmLwQmIDI', 'YJ9LkY6qer', 'FD5L12MlnJ', 'WKrLUdcaKu', 'nSDL66ZrvN', 'n8ALnIWI09', 'ilygRyZ4QgBKW8Ijmp7', 'A9RGrWZCZfYhGE5w4ss'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, WI7S4clJJjvtMQV1TX.csHigh entropy of concatenated method names: 'yi8SWscyOs', 'gNkSBbjCqs', 'YwGS2loKkp', 'Tp42hmVODY', 'Sdl2z3qy0w', 'GkUSgkfPqu', 'UEgSd5mfSV', 'Wg0SxE6WdO', 'VTVSZ7KZyf', 'BBAStZ3KFI'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, MRUrIFhVHCHmjaKjLg.csHigh entropy of concatenated method names: 'FHaIBMnHqY', 'MG1IR30geR', 'BBtI2jqdiW', 't2AISjcN2b', 'a7wIC7HgvS', 'hloIePpd5U', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, OMJwWhtuyHZSmnujPy.csHigh entropy of concatenated method names: 'Re7dS4Rslq', 'EZide8SkrQ', 'TrCdN97hSP', 'H9gdGLQMEJ', 'q3SdJSwGpf', 'BLPdKbsqhT', 'DnSiOu31BBsMtuvXhG', 'WAQEXJk5OP0o3QIoHN', 'PrOdd7hqYX', 'YqFdZJH8rO'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, DYSHytdgDHYAh2t6JCI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hdCIsiXrf7', 'GmZIA2nI7s', 'gwPIX24joO', 'AGYIYc2tva', 'JrBIvHFNRj', 'sK4Iy9pWNM', 'o7hIbqco7m'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, w2OQby0n1OWhhPItNQ.csHigh entropy of concatenated method names: 'qdcSDtsnXv', 'rJvS9a6cGy', 'JvwSQnCjbg', 'iNUSTXvVD8', 'eTVSoaO9VP', 'uq8SHdwWif', 'vE2SP1JVyN', 'RIXSVA8x5w', 'nWSSwa2AER', 'a66SkvCArq'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, xVW5VofQYD3H1H3INv.csHigh entropy of concatenated method names: 'Dispose', 'SmHdrgaZx2', 'yahxUCdVW8', 'QvDpchl3FR', 'qrGdh8QcoZ', 'C9KdzMvZQd', 'ProcessDialogKey', 'PuuxgALSNR', 'nBpxdBtYkL', 'vPFxx0RUrI'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, nD0CAgxq1sCwK7Kq5N.csHigh entropy of concatenated method names: 'Sb8Qp03E7', 'Yj7TQLL0h', 'DGvHp4u9V', 'uKlPHvGCt', 'hdHw7kmtA', 'MLBkbd0Pt', 'j2PrLvUwNyfXVmC3f4', 'sAkhEcr2SxFiNE1ojo', 'IVRu0REYt', 'edLIPkGTA'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, KTjeidzOuL38m3obwO.csHigh entropy of concatenated method names: 'LPmIHKWOdF', 'abNIVYQbAd', 'KWKIw8HgQD', 'QdSI1FH0hX', 'TKWIULMF3p', 'OSZInJO4Un', 'q5OIOCEJlP', 'vt8I5y84Ym', 'feEIDablRA', 'zHTI9sJHT4'
          Source: 0.2.800399031-18.11.2024.pdf.exe.7050000.5.raw.unpack, FFooHFdd1A2y2kYf9tb.csHigh entropy of concatenated method names: 'LSUIhU7RXf', 'VcDIzACAaI', 'LoGLgedpPe', 'PAjLdQHaxc', 'TXmLxdX4yo', 'HoBLZk1sD7', 'eUBLtBk6QV', 'DfpLEuPePZ', 'W49LWtGCa4', 'F2PLfk1gIY'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, HfFRpTMKwKJ58wk6Eb.csHigh entropy of concatenated method names: 'Jexiq9cUuW', 'As4ihLpZV9', 'kfYugxZA24', 'EGVudq3AM8', 'B7dis3JUEw', 'lsNiA2wWUI', 'DQliXRimS1', 'OpGiYhyEOw', 'cfOivMOoj7', 'vFxiyA0N9P'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, zMEJFvkLIDjYHi3SSw.csHigh entropy of concatenated method names: 'DFURo8QPQG', 'kIQRPYqHg3', 'fhsB6GmLUr', 'lPJBnhHoH9', 'QkjBOvR73l', 'PF8BmeIMe2', 'r38Bl7goAs', 'PUpB4ouUfT', 'UEnB0TJ8pl', 'WWQB7qoOJg'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, ir1V3pXINhZmmC7Xxt.csHigh entropy of concatenated method names: 'rGP3VHZ5Q5', 'hvs3wqY1PB', 'MEJ31Jg1Uu', 'd7j3UBpFN0', 'sIl3nkbDY8', 'CnX3OLb0WM', 'qQf3lQ8Gav', 'i1L34cEngQ', 'Y8r37tgK7G', 'TYx3sKLmw4'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, p92b9bwrC97hSP69gL.csHigh entropy of concatenated method names: 'vCcBTQmWN5', 'GOCBHWfXqu', 'RXcBVjVILm', 'BiDBw3sSLD', 'LSCBJfep5x', 'nDXBKcd1Ee', 'PKnBi8qqr2', 'kJ2BuIlBUg', 'JD3BCrc1MU', 'NAVBIv0Eub'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, CEvZjQy61D297BuFoX.csHigh entropy of concatenated method names: 'ToString', 'EuMKskTR7Z', 'beqKUu5An6', 'R7GK6G3vao', 'xO3Knk17LO', 'LK9KOP7csy', 'hpdKmCBYGB', 'DkEKlHMSa8', 'TOYK4pavev', 's8aK0CP5nT'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, N4RslqVwZi8SkrQt4i.csHigh entropy of concatenated method names: 'gJTfY4l6Ni', 'iDVfvcMt8r', 'ey2fyUfW0U', 'r3PfbfZsNG', 'xJxfFOPM6X', 'd45fMqoXdD', 'xqMfpQhAlB', 'KrCfqTF7FV', 'hNZfr1FIj4', 'jyffh5ThQq'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, UqS5nfpPMymHgaZx2i.csHigh entropy of concatenated method names: 'yB1CJNpgGd', 'GnfCiZ6SJb', 'd4uCCbYytk', 'vT9CLFgVwo', 'cyoCaNBGn8', 'IEbC5lDQ3E', 'Dispose', 'X3iuW7jmk1', 'rGOufxyOhh', 'MUOuB51mdH'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, mpfoLP1bsqhTTncjAj.csHigh entropy of concatenated method names: 'esy2EnqZKK', 'kMw2fWLnUv', 'B0H2RcBfug', 'p8R2SfjfIb', 'e4R2emECbZ', 'L1iRFshk2I', 'NVaRMUCBKy', 'YcpRprNCdd', 'rbsRqQT5ex', 'wUZRrAMm39'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, Ka8i3heuLve4fNonOR.csHigh entropy of concatenated method names: 'dq9ZE1DJLV', 'nFnZW22l0v', 'zY6ZfFRe7K', 'XBMZBfKGMl', 'vZ3ZRWv6wM', 'HJDZ20cTOP', 'bu7ZSxOmUd', 'f2mZekCii2', 'dHJZj8SYvv', 'gGYZN25eX0'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, rALSNRr3BpBtYkLaPF.csHigh entropy of concatenated method names: 'ofKC1Je1ds', 'Uv9CUGJsqF', 'UOPC69SEJW', 'riuCnMqI7D', 'WK7CO84rxC', 'T6ZCm5qtpo', 'K1oCleNmDx', 'jmvC4MhPFr', 'BlAC0mMx7I', 'AxAC7r4OtA'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, ctcIsAdtKlODHvHmcHg.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'ChlcCHFINR', 'mQDcICRcO5', 'JpQcLbBynH', 'yjlcc1h33d', 'GTucar6TYc', 'HRmc85sR0M', 'VKNc5RQk8p'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, FGPA5rdx7yYw0MaYL2Q.csHigh entropy of concatenated method names: 'ToString', 'PBjLVkTQjK', 'GfmLwQmIDI', 'YJ9LkY6qer', 'FD5L12MlnJ', 'WKrLUdcaKu', 'nSDL66ZrvN', 'n8ALnIWI09', 'ilygRyZ4QgBKW8Ijmp7', 'A9RGrWZCZfYhGE5w4ss'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, WI7S4clJJjvtMQV1TX.csHigh entropy of concatenated method names: 'yi8SWscyOs', 'gNkSBbjCqs', 'YwGS2loKkp', 'Tp42hmVODY', 'Sdl2z3qy0w', 'GkUSgkfPqu', 'UEgSd5mfSV', 'Wg0SxE6WdO', 'VTVSZ7KZyf', 'BBAStZ3KFI'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, MRUrIFhVHCHmjaKjLg.csHigh entropy of concatenated method names: 'FHaIBMnHqY', 'MG1IR30geR', 'BBtI2jqdiW', 't2AISjcN2b', 'a7wIC7HgvS', 'hloIePpd5U', 'Next', 'Next', 'Next', 'NextBytes'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, OMJwWhtuyHZSmnujPy.csHigh entropy of concatenated method names: 'Re7dS4Rslq', 'EZide8SkrQ', 'TrCdN97hSP', 'H9gdGLQMEJ', 'q3SdJSwGpf', 'BLPdKbsqhT', 'DnSiOu31BBsMtuvXhG', 'WAQEXJk5OP0o3QIoHN', 'PrOdd7hqYX', 'YqFdZJH8rO'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, DYSHytdgDHYAh2t6JCI.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'hdCIsiXrf7', 'GmZIA2nI7s', 'gwPIX24joO', 'AGYIYc2tva', 'JrBIvHFNRj', 'sK4Iy9pWNM', 'o7hIbqco7m'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, w2OQby0n1OWhhPItNQ.csHigh entropy of concatenated method names: 'qdcSDtsnXv', 'rJvS9a6cGy', 'JvwSQnCjbg', 'iNUSTXvVD8', 'eTVSoaO9VP', 'uq8SHdwWif', 'vE2SP1JVyN', 'RIXSVA8x5w', 'nWSSwa2AER', 'a66SkvCArq'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, xVW5VofQYD3H1H3INv.csHigh entropy of concatenated method names: 'Dispose', 'SmHdrgaZx2', 'yahxUCdVW8', 'QvDpchl3FR', 'qrGdh8QcoZ', 'C9KdzMvZQd', 'ProcessDialogKey', 'PuuxgALSNR', 'nBpxdBtYkL', 'vPFxx0RUrI'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, nD0CAgxq1sCwK7Kq5N.csHigh entropy of concatenated method names: 'Sb8Qp03E7', 'Yj7TQLL0h', 'DGvHp4u9V', 'uKlPHvGCt', 'hdHw7kmtA', 'MLBkbd0Pt', 'j2PrLvUwNyfXVmC3f4', 'sAkhEcr2SxFiNE1ojo', 'IVRu0REYt', 'edLIPkGTA'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, KTjeidzOuL38m3obwO.csHigh entropy of concatenated method names: 'LPmIHKWOdF', 'abNIVYQbAd', 'KWKIw8HgQD', 'QdSI1FH0hX', 'TKWIULMF3p', 'OSZInJO4Un', 'q5OIOCEJlP', 'vt8I5y84Ym', 'feEIDablRA', 'zHTI9sJHT4'
          Source: 0.2.800399031-18.11.2024.pdf.exe.35f9790.1.raw.unpack, FFooHFdd1A2y2kYf9tb.csHigh entropy of concatenated method names: 'LSUIhU7RXf', 'VcDIzACAaI', 'LoGLgedpPe', 'PAjLdQHaxc', 'TXmLxdX4yo', 'HoBLZk1sD7', 'eUBLtBk6QV', 'DfpLEuPePZ', 'W49LWtGCa4', 'F2PLfk1gIY'
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004063C6 ShellExecuteW,URLDownloadToFileW,2_2_004063C6
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,2_2_00418A00
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041A8DA
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTR
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040E18D Sleep,ExitProcess,2_2_0040E18D
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 2420000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 4470000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 75B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 85B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 8770000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: 9770000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,2_2_004186FE
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeWindow / User API: threadDelayed 9356Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeWindow / User API: foregroundWindowGot 1767Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 2124Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 7120Thread sleep count: 237 > 30Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 7120Thread sleep time: -118500s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 4092Thread sleep count: 173 > 30Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 4092Thread sleep time: -519000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 4092Thread sleep count: 9356 > 30Jump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe TID: 4092Thread sleep time: -28068000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,2_2_0041A01B
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,2_2_0040B28E
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_0040838E
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,2_2_004087A0
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,2_2_00407848
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004068CD FindFirstFileW,FindNextFileW,2_2_004068CD
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_0040AA71
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,2_2_00417AAB
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,2_2_0040AC78
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,2_2_00406D28
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4137005064.000000000147D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeAPI call chain: ExitProcess graph end nodegraph_2-47182
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004327AE
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_0041A8DA LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,2_2_0041A8DA
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004407B5 mov eax, dword ptr fs:[00000030h]2_2_004407B5
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,2_2_00410763
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004327AE
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004328FC SetUnhandledExceptionFilter,2_2_004328FC
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004398AC
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00432D5C
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeMemory written: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe2_2_00410B5C
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004175E1 mouse_event,2_2_004175E1
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeProcess created: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe "C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"Jump to behavior
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerF
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001465000.00000004.00000020.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerNP\
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageres }
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager.0\Modu
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001457000.00000004.00000020.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001465000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
          Source: 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136904303.0000000001447000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004329DA cpuid 2_2_004329DA
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetLocaleInfoA,2_2_0040E2BB
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: EnumSystemLocalesW,2_2_0044F17B
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: EnumSystemLocalesW,2_2_0044F130
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: EnumSystemLocalesW,2_2_0044F216
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_0044F2A3
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetLocaleInfoW,2_2_0044F4F3
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_0044F61C
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetLocaleInfoW,2_2_0044F723
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_0044F7F0
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: EnumSystemLocalesW,2_2_00445914
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: GetLocaleInfoW,2_2_00445E1C
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_0044EEB8
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYML.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\OFFSYMB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_00404F31 GetLocalTime,CreateEventA,CreateThread,2_2_00404F31
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004195F8 GetComputerNameExW,GetUserNameW,2_2_004195F8
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: 2_2_004468DC _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,2_2_004468DC
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 7160, type: MEMORYSTR
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data2_2_0040A953
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\2_2_0040AA71
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: \key3.db2_2_0040AA71

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.800399031-18.11.2024.pdf.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.3f7a1b0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.800399031-18.11.2024.pdf.exe.353fb70.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 2104, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: 800399031-18.11.2024.pdf.exe PID: 7160, type: MEMORYSTR
          Source: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exeCode function: cmd.exe2_2_0040567A
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          2
          System Time Discovery
          Remote Services11
          Archive Collected Data
          12
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Command and Scripting Interpreter
          1
          Windows Service
          1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          211
          Input Capture
          1
          Account Discovery
          Remote Desktop Protocol211
          Input Capture
          2
          Encrypted Channel
          Exfiltration Over Bluetooth1
          Defacement
          Email AddressesDNS ServerDomain Accounts2
          Service Execution
          Logon Script (Windows)1
          Windows Service
          3
          Obfuscated Files or Information
          2
          Credentials In Files
          1
          System Service Discovery
          SMB/Windows Admin Shares3
          Clipboard Data
          1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook122
          Process Injection
          12
          Software Packing
          NTDS2
          File and Directory Discovery
          Distributed Component Object ModelInput Capture2
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets33
          System Information Discovery
          SSHKeylogging12
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Masquerading
          Cached Domain Credentials21
          Security Software Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
          Virtualization/Sandbox Evasion
          DCSync31
          Virtualization/Sandbox Evasion
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Access Token Manipulation
          Proc Filesystem2
          Process Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt122
          Process Injection
          /etc/passwd and /etc/shadow1
          Application Window Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
          System Owner/User Discovery
          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          800399031-18.11.2024.pdf.exe66%ReversingLabsByteCode-MSIL.Trojan.Taskun
          800399031-18.11.2024.pdf.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://www.monotype.y0%Avira URL Cloudsafe
          oyo.work.gd100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          geoplugin.net
          178.237.33.50
          truefalse
            high
            oyo.work.gd
            154.216.20.185
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              oyo.work.gdtrue
              • Avira URL Cloud: malware
              unknown
              http://geoplugin.net/json.gpfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersG800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bThe800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers?800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.tiro.com800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.kr800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://geoplugin.net/json.gpSystem32800399031-18.11.2024.pdf.exe, 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.carterandcone.coml800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sajatypeworks.com800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.typography.netD800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.fontbureau.com/designers/cabarga.htmlN800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.founder.com.cn/cn/cThe800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.galapagosdesign.com/staff/dennis.htm800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.founder.com.cn/cn800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.com/designers/frere-user.html800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://geoplugin.net/json.gp/C800399031-18.11.2024.pdf.exe, 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, 800399031-18.11.2024.pdf.exe, 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.jiyu-kobo.co.jp/800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.galapagosdesign.com/DPlease800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.com/designers8800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.fonts.com800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sandoll.co.kr800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.urwpp.deDPlease800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.zhongyicts.com.cn800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://www.sakkal.com800399031-18.11.2024.pdf.exe, 00000000.00000002.1705826136.0000000006752000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.monotype.y800399031-18.11.2024.pdf.exe, 00000000.00000002.1705619618.0000000004FB0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      178.237.33.50
                                                                      geoplugin.netNetherlands
                                                                      8455ATOM86-ASATOM86NLfalse
                                                                      154.216.20.185
                                                                      oyo.work.gdSeychelles
                                                                      135357SKHT-ASShenzhenKatherineHengTechnologyInformationCofalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1560892
                                                                      Start date and time:2024-11-22 14:05:09 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 7m 56s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:7
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:800399031-18.11.2024.pdf.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.rans.troj.spyw.evad.winEXE@3/3@4/2
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 99%
                                                                      • Number of executed functions: 67
                                                                      • Number of non-executed functions: 180
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • VT rate limit hit for: 800399031-18.11.2024.pdf.exe
                                                                      TimeTypeDescription
                                                                      08:06:00API Interceptor7664356x Sleep call for process: 800399031-18.11.2024.pdf.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      178.237.33.50Purchase Inquiry_002.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      APPENDIX FORM_N#U00b045013-20241120.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • geoplugin.net/json.gp
                                                                      wE1inOhJA5.msiGet hashmaliciousRemcos, RHADAMANTHYSBrowse
                                                                      • geoplugin.net/json.gp
                                                                      ORDER AND SPECIFICATIONS.scr.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      1732147507ac10953a908ae794c5ee180add9124a78c69705135688e502bb56ce4453da749198.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                      • geoplugin.net/json.gp
                                                                      pi-77159.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                      • geoplugin.net/json.gp
                                                                      sostener.vbsGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • geoplugin.net/json.gp
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      oyo.work.gdungziped_file.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      file.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      ES20241104044200_1910049770.pdf.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      018292540-SuratTeguranPPI-20230814215304.PDF.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      file.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      file.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      ATH0000878718.pdf.exeGet hashmaliciousRemcosBrowse
                                                                      • 154.216.20.185
                                                                      geoplugin.netPurchase Inquiry_002.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      APPENDIX FORM_N#U00b045013-20241120.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 178.237.33.50
                                                                      wE1inOhJA5.msiGet hashmaliciousRemcos, RHADAMANTHYSBrowse
                                                                      • 178.237.33.50
                                                                      ORDER AND SPECIFICATIONS.scr.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      1732147507ac10953a908ae794c5ee180add9124a78c69705135688e502bb56ce4453da749198.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                      • 178.237.33.50
                                                                      pi-77159.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                      • 178.237.33.50
                                                                      sostener.vbsGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      SKHT-ASShenzhenKatherineHengTechnologyInformationCovkjqpc.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      vsbeps.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      wnbw86.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      qkehusl.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      dwhdbg.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      iwir64.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      wriww68k.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      dvwkja7.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      wheiuwa4.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      vwkjebwi686.elfGet hashmaliciousMiraiBrowse
                                                                      • 154.216.16.109
                                                                      ATOM86-ASATOM86NLPurchase Inquiry_002.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      APPENDIX FORM_N#U00b045013-20241120.com.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                      • 178.237.33.50
                                                                      wE1inOhJA5.msiGet hashmaliciousRemcos, RHADAMANTHYSBrowse
                                                                      • 178.237.33.50
                                                                      ORDER AND SPECIFICATIONS.scr.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      1732147507ac10953a908ae794c5ee180add9124a78c69705135688e502bb56ce4453da749198.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      1732143786cec792bea7f8ce7f818c031173ce52fabd19dde842f74b07fc234dc9f3fa1dcf839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      seethebestthignswhichgivingbestopportunities.htaGet hashmaliciousCobalt Strike, Remcos, HTMLPhisherBrowse
                                                                      • 178.237.33.50
                                                                      pi-77159.xlsGet hashmaliciousRemcos, HTMLPhisherBrowse
                                                                      • 178.237.33.50
                                                                      sostener.vbsGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      1732086011ea45d03916726c55fa40ae0b8f39b9a24a40da5a5e79d29c703a7fb444bdeb31407.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                      • 178.237.33.50
                                                                      No context
                                                                      No context
                                                                      Process:C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):224
                                                                      Entropy (8bit):6.974575486873097
                                                                      Encrypted:false
                                                                      SSDEEP:3:UT3Al0w0zIWuVDaNcu9AHYLf5UJg//LLnzQ3Zaw+3HfH/kamz5B+eN780gqdqOF0:U7AuhIW5JA4LmgjLhzm1DgNOi
                                                                      MD5:FEF1F59A047F8EA4422AA4C6367949DA
                                                                      SHA1:F033D0E0DE151FDD33CA23D1DB4CEA7C69D519A9
                                                                      SHA-256:51BC823D9CAEE21719D042C55F51F44B5012C51E220FF077B8E2371F69ADC078
                                                                      SHA-512:52E74B9B4527A3DDBD9E00C342CCB8FCA4926BFE98F6BEE25109842BC9F721B8831270108E5C8DA2A777CFAD83A78E32E9229AC62EDA214392E1E0BC1833EB96
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:6..6....y..S..LT.QO..T.u.A..Vr...v....0..r......I.l....l......Jb.=\.vv..S......pUq..'.."Us..*..}E.3.M..6i..-.P|.i.h=u.#.n....)...6.a....xY.-.Of.X4.K.f.S 8 ..q...3.w{f...W.tP..a.0..Q..a...M.7.6...#.q...... ...O
                                                                      Process:C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1216
                                                                      Entropy (8bit):5.34331486778365
                                                                      Encrypted:false
                                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                      Malicious:true
                                                                      Reputation:high, very likely benign file
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                      Process:C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                      File Type:JSON data
                                                                      Category:dropped
                                                                      Size (bytes):962
                                                                      Entropy (8bit):5.015105568788186
                                                                      Encrypted:false
                                                                      SSDEEP:12:tkluQ+nd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qluQydRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                      MD5:8937B63DC0B37E949F38E7874886D999
                                                                      SHA1:62FD17BF5A029DDD3A5CFB4F5FC9FE83A346FFFC
                                                                      SHA-256:AB2F31E4512913B1E7F7ACAB4B72D6E741C960D0A482F09EA6F9D96FED842A66
                                                                      SHA-512:077176C51DC10F155EE08326270C1FE3E6CF36C7ABA75611BDB3CCDA2526D6F0360DBC2FBF4A9963051F0F01658017389FD898980ACF7BB3B29B287F188EE7B9
                                                                      Malicious:false
                                                                      Reputation:low
                                                                      Preview:{. "geoplugin_request":"8.46.123.75",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.978253537554535
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                      • Windows Screen Saver (13104/52) 0.07%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      File name:800399031-18.11.2024.pdf.exe
                                                                      File size:1'049'088 bytes
                                                                      MD5:54a5436bb5bf3977e98eda5ce6f8e8d2
                                                                      SHA1:5aed6273fe965d5e0c41b0e934aa92099327e4da
                                                                      SHA256:efbc15ccbe9e7b1f1648d94c5e38e3149bff5d33ad93c0a56e68db648050509a
                                                                      SHA512:0948ad9fb15f733c2a7df75f72da0dbd9a96e27b8228b11346c20fdcd0fc2888c634bc2ba5cb3ffd82c79190745ac7eba8f278d7036d79fa2cab6de8fc1f6ab9
                                                                      SSDEEP:12288:FWCYKo7G7uh5W7R1c7MWLy5FbvG8bDzIMM3bGpsgUVEgcb8YaMCnHMybyac7nSZ7:FW+o7Co5Ww7Muyjbu4VlUVEtaMJZ7SZ
                                                                      TLSH:0B2523892298EFE2C4376FF06661158803F9E0361731F79E6DE5A1CE4865B2C5B20F5B
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....;g..............0......"........... ........@.. .......................@............@................................
                                                                      Icon Hash:e33425174edb3931
                                                                      Entrypoint:0x4ffdae
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x673BEBB9 [Tue Nov 19 01:36:57 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xffd5c0x4f.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x1fe8.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1020000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000xfddb40xfde009b72b67b6b04c0c97432f32f30edd54aFalse0.9769154280526834data7.9814858680694005IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x1000000x1fe80x2000b23a7f515f96be5fba539daf92202834False0.85693359375data7.485193376965554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x1020000xc0x20055f77c11eedf0da558f81850ce8d60e7False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0x1001000x18dfPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9715721689963877
                                                                      RT_GROUP_ICON0x1019f00x14data1.05
                                                                      RT_VERSION0x101a140x3d4data0.3979591836734694
                                                                      RT_MANIFEST0x101df80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                      2024-11-22T14:06:08.811190+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.449734154.216.20.1853142TCP
                                                                      2024-11-22T14:06:11.450772+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.449736178.237.33.5080TCP
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 22, 2024 14:06:07.341919899 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:07.462271929 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:07.462397099 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:07.467432976 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:07.588028908 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:08.765224934 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:08.811189890 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:08.998477936 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:09.003380060 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:09.123128891 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:09.125694990 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:09.247102976 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:09.669486046 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:09.670794010 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:09.790656090 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:09.861735106 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:09.904736996 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:10.057826996 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:06:10.177788019 CET8049736178.237.33.50192.168.2.4
                                                                      Nov 22, 2024 14:06:10.177983046 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:06:10.178122044 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:06:10.299556017 CET8049736178.237.33.50192.168.2.4
                                                                      Nov 22, 2024 14:06:11.450663090 CET8049736178.237.33.50192.168.2.4
                                                                      Nov 22, 2024 14:06:11.450772047 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:06:11.459261894 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:11.578928947 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:12.450439930 CET8049736178.237.33.50192.168.2.4
                                                                      Nov 22, 2024 14:06:12.450535059 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:06:39.686368942 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:06:39.688250065 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:06:39.823064089 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:07:09.704365015 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:07:09.706610918 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:07:09.830766916 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:07:39.720979929 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:07:39.722671032 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:07:39.844981909 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:07:59.905148029 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:00.217516899 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:00.877180099 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:02.217521906 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:04.717529058 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:09.608283997 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:09.736854076 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:08:09.740426064 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:08:09.863723040 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:08:19.311359882 CET4973680192.168.2.4178.237.33.50
                                                                      Nov 22, 2024 14:08:39.755207062 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:08:39.760570049 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:08:39.880270004 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:09:09.781464100 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:09:09.784183979 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:09:09.903963089 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:09:39.791414976 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:09:39.800738096 CET497343142192.168.2.4154.216.20.185
                                                                      Nov 22, 2024 14:09:39.925261021 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:10:09.807943106 CET314249734154.216.20.185192.168.2.4
                                                                      Nov 22, 2024 14:10:09.858505011 CET497343142192.168.2.4154.216.20.185
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Nov 22, 2024 14:06:04.410737038 CET5975353192.168.2.41.1.1.1
                                                                      Nov 22, 2024 14:06:05.420685053 CET5975353192.168.2.41.1.1.1
                                                                      Nov 22, 2024 14:06:06.420408010 CET5975353192.168.2.41.1.1.1
                                                                      Nov 22, 2024 14:06:07.338521957 CET53597531.1.1.1192.168.2.4
                                                                      Nov 22, 2024 14:06:07.338548899 CET53597531.1.1.1192.168.2.4
                                                                      Nov 22, 2024 14:06:07.338563919 CET53597531.1.1.1192.168.2.4
                                                                      Nov 22, 2024 14:06:09.900625944 CET5859253192.168.2.41.1.1.1
                                                                      Nov 22, 2024 14:06:10.053999901 CET53585921.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Nov 22, 2024 14:06:04.410737038 CET192.168.2.41.1.1.10x49cStandard query (0)oyo.work.gdA (IP address)IN (0x0001)false
                                                                      Nov 22, 2024 14:06:05.420685053 CET192.168.2.41.1.1.10x49cStandard query (0)oyo.work.gdA (IP address)IN (0x0001)false
                                                                      Nov 22, 2024 14:06:06.420408010 CET192.168.2.41.1.1.10x49cStandard query (0)oyo.work.gdA (IP address)IN (0x0001)false
                                                                      Nov 22, 2024 14:06:09.900625944 CET192.168.2.41.1.1.10x8f9bStandard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Nov 22, 2024 14:06:07.338521957 CET1.1.1.1192.168.2.40x49cNo error (0)oyo.work.gd154.216.20.185A (IP address)IN (0x0001)false
                                                                      Nov 22, 2024 14:06:07.338548899 CET1.1.1.1192.168.2.40x49cNo error (0)oyo.work.gd154.216.20.185A (IP address)IN (0x0001)false
                                                                      Nov 22, 2024 14:06:07.338563919 CET1.1.1.1192.168.2.40x49cNo error (0)oyo.work.gd154.216.20.185A (IP address)IN (0x0001)false
                                                                      Nov 22, 2024 14:06:10.053999901 CET1.1.1.1192.168.2.40x8f9bNo error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                      • geoplugin.net
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.449736178.237.33.50807160C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      Nov 22, 2024 14:06:10.178122044 CET71OUTGET /json.gp HTTP/1.1
                                                                      Host: geoplugin.net
                                                                      Cache-Control: no-cache
                                                                      Nov 22, 2024 14:06:11.450663090 CET1170INHTTP/1.1 200 OK
                                                                      date: Fri, 22 Nov 2024 13:06:11 GMT
                                                                      server: Apache
                                                                      content-length: 962
                                                                      content-type: application/json; charset=utf-8
                                                                      cache-control: public, max-age=300
                                                                      access-control-allow-origin: *
                                                                      Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                                      Data Ascii: { "geoplugin_request":"8.46.123.75", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:08:05:59
                                                                      Start date:22/11/2024
                                                                      Path:C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"
                                                                      Imagebase:0x100000
                                                                      File size:1'049'088 bytes
                                                                      MD5 hash:54A5436BB5BF3977E98EDA5CE6F8E8D2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1703546933.0000000003F7A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.1703546933.0000000003479000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:08:06:03
                                                                      Start date:22/11/2024
                                                                      Path:C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe"
                                                                      Imagebase:0xdc0000
                                                                      File size:1'049'088 bytes
                                                                      MD5 hash:54A5436BB5BF3977E98EDA5CE6F8E8D2
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4136770133.0000000001408000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                      Reputation:low
                                                                      Has exited:false

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:9.2%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:272
                                                                        Total number of Limit Nodes:14
                                                                        execution_graph 35808 4a965e8 35811 4a95824 35808->35811 35810 4a96607 35812 4a9582f 35811->35812 35816 244809c 35812->35816 35823 2449458 35812->35823 35813 4a966ea 35813->35810 35817 24480a7 35816->35817 35819 244971b 35817->35819 35830 244b6c0 35817->35830 35833 244b4e8 35817->35833 35818 2449759 35818->35813 35819->35818 35837 244c900 35819->35837 35824 2449493 35823->35824 35826 244971b 35824->35826 35827 244b6c0 GetModuleHandleW 35824->35827 35828 244b4e8 GetModuleHandleW 35824->35828 35825 2449759 35825->35813 35826->35825 35829 244c900 GetModuleHandleW 35826->35829 35827->35826 35828->35826 35829->35825 35841 244b910 35830->35841 35831 244b6ce 35831->35819 35834 244b517 35833->35834 35835 244b66a 35834->35835 35836 244b910 GetModuleHandleW 35834->35836 35835->35819 35836->35835 35838 244c921 35837->35838 35839 244c945 35838->35839 35846 244cab0 35838->35846 35839->35818 35842 244b944 35841->35842 35843 244b921 35841->35843 35842->35831 35843->35842 35844 244bb48 GetModuleHandleW 35843->35844 35845 244bb75 35844->35845 35845->35831 35847 244cabd 35846->35847 35848 244caf7 35847->35848 35850 244be80 35847->35850 35848->35839 35851 244be8b 35850->35851 35853 244d810 35851->35853 35854 244bf88 35851->35854 35855 244bf93 35854->35855 35856 244809c GetModuleHandleW 35855->35856 35857 244d87f 35856->35857 35857->35853 35879 6e3d840 35880 6e3d9cb 35879->35880 35882 6e3d866 35879->35882 35882->35880 35883 6e39ad0 35882->35883 35884 6e3dac0 PostMessageW 35883->35884 35885 6e3db2c 35884->35885 35885->35882 35917 229d01c 35918 229d034 35917->35918 35919 229d08e 35918->35919 35921 4a9112c CallWindowProcW 35918->35921 35922 4a92c08 35918->35922 35921->35919 35924 4a92c45 35922->35924 35925 4a92c69 35924->35925 35926 4a91254 CallWindowProcW 35924->35926 35926->35925 35868 4a942b0 35869 4a943ac 35868->35869 35870 4a94302 35868->35870 35874 4a9112c 35869->35874 35872 4a94309 35870->35872 35873 4a9435a CallWindowProcW 35870->35873 35873->35872 35875 4a91137 35874->35875 35877 4a92c69 35875->35877 35878 4a91254 CallWindowProcW 35875->35878 35878->35877 35927 4a9f450 35929 4a9f4c6 35927->35929 35930 4a9e318 35927->35930 35931 4a9e323 35930->35931 35934 4a9e338 35931->35934 35935 4a9e343 35934->35935 35937 244809c GetModuleHandleW 35935->35937 35938 2449458 GetModuleHandleW 35935->35938 35936 4a9f582 35936->35929 35937->35936 35938->35936 35939 6e3bd59 35940 6e3bb93 35939->35940 35941 6e3bf13 35940->35941 35945 6e3c5f6 35940->35945 35966 6e3c598 35940->35966 35986 6e3c589 35940->35986 35946 6e3c584 35945->35946 35948 6e3c5f9 35945->35948 35947 6e3c5d6 35946->35947 36006 6e3cb40 35946->36006 36011 6e3cfdc 35946->36011 36016 6e3cc3c 35946->36016 36024 6e3cb1e 35946->36024 36029 6e3d07e 35946->36029 36041 6e3ccd4 35946->36041 36046 6e3ca95 35946->36046 36051 6e3cd76 35946->36051 36055 6e3cdb1 35946->36055 36060 6e3cdf1 35946->36060 36065 6e3cb72 35946->36065 36070 6e3cf72 35946->36070 36075 6e3d14c 35946->36075 36080 6e3d02b 35946->36080 36084 6e3ca8b 35946->36084 36089 6e3cac5 35946->36089 36094 6e3ca26 35946->36094 35947->35941 35948->35941 35967 6e3c5b2 35966->35967 35968 6e3c5d6 35967->35968 35969 6e3cb40 2 API calls 35967->35969 35970 6e3ca26 2 API calls 35967->35970 35971 6e3cac5 2 API calls 35967->35971 35972 6e3ca8b 2 API calls 35967->35972 35973 6e3d02b 2 API calls 35967->35973 35974 6e3d14c 2 API calls 35967->35974 35975 6e3cf72 2 API calls 35967->35975 35976 6e3cb72 2 API calls 35967->35976 35977 6e3cdf1 2 API calls 35967->35977 35978 6e3cdb1 2 API calls 35967->35978 35979 6e3cd76 2 API calls 35967->35979 35980 6e3ca95 2 API calls 35967->35980 35981 6e3ccd4 2 API calls 35967->35981 35982 6e3d07e 4 API calls 35967->35982 35983 6e3cb1e 2 API calls 35967->35983 35984 6e3cc3c 4 API calls 35967->35984 35985 6e3cfdc 2 API calls 35967->35985 35968->35941 35969->35968 35970->35968 35971->35968 35972->35968 35973->35968 35974->35968 35975->35968 35976->35968 35977->35968 35978->35968 35979->35968 35980->35968 35981->35968 35982->35968 35983->35968 35984->35968 35985->35968 35987 6e3c592 35986->35987 35988 6e3c5d6 35987->35988 35989 6e3cb40 2 API calls 35987->35989 35990 6e3ca26 2 API calls 35987->35990 35991 6e3cac5 2 API calls 35987->35991 35992 6e3ca8b 2 API calls 35987->35992 35993 6e3d02b 2 API calls 35987->35993 35994 6e3d14c 2 API calls 35987->35994 35995 6e3cf72 2 API calls 35987->35995 35996 6e3cb72 2 API calls 35987->35996 35997 6e3cdf1 2 API calls 35987->35997 35998 6e3cdb1 2 API calls 35987->35998 35999 6e3cd76 2 API calls 35987->35999 36000 6e3ca95 2 API calls 35987->36000 36001 6e3ccd4 2 API calls 35987->36001 36002 6e3d07e 4 API calls 35987->36002 36003 6e3cb1e 2 API calls 35987->36003 36004 6e3cc3c 4 API calls 35987->36004 36005 6e3cfdc 2 API calls 35987->36005 35988->35941 35989->35988 35990->35988 35991->35988 35992->35988 35993->35988 35994->35988 35995->35988 35996->35988 35997->35988 35998->35988 35999->35988 36000->35988 36001->35988 36002->35988 36003->35988 36004->35988 36005->35988 36007 6e3ca81 36006->36007 36008 6e3d0f5 36007->36008 36098 6e3b411 36007->36098 36102 6e3b418 36007->36102 36012 6e3cfdd 36011->36012 36106 6e3b4d1 36012->36106 36110 6e3b4d8 36012->36110 36013 6e3d00c 36122 6e3d781 36016->36122 36127 6e3d790 36016->36127 36017 6e3ccaa 36017->35947 36018 6e3cb3c 36018->36017 36114 6e3ae50 36018->36114 36118 6e3ae58 36018->36118 36019 6e3cb9e 36019->36019 36025 6e3cb24 36024->36025 36027 6e3ae50 ResumeThread 36025->36027 36028 6e3ae58 ResumeThread 36025->36028 36026 6e3cb9e 36027->36026 36028->36026 36030 6e3d02d 36029->36030 36031 6e3d08d 36029->36031 36140 6e3b5c0 36030->36140 36144 6e3b5c8 36030->36144 36033 6e3ca81 36031->36033 36039 6e3b411 VirtualAllocEx 36031->36039 36040 6e3b418 VirtualAllocEx 36031->36040 36032 6e3d04d 36032->35947 36034 6e3d0f5 36033->36034 36035 6e3b411 VirtualAllocEx 36033->36035 36036 6e3b418 VirtualAllocEx 36033->36036 36035->36033 36036->36033 36039->36033 36040->36033 36042 6e3cc0c 36041->36042 36042->36041 36043 6e3d2aa 36042->36043 36044 6e3b4d1 WriteProcessMemory 36042->36044 36045 6e3b4d8 WriteProcessMemory 36042->36045 36043->35947 36044->36042 36045->36042 36047 6e3ca81 36046->36047 36048 6e3d0f5 36047->36048 36049 6e3b411 VirtualAllocEx 36047->36049 36050 6e3b418 VirtualAllocEx 36047->36050 36049->36047 36050->36047 36053 6e3af00 Wow64SetThreadContext 36051->36053 36054 6e3af08 Wow64SetThreadContext 36051->36054 36052 6e3cd90 36053->36052 36054->36052 36056 6e3cdd8 36055->36056 36058 6e3b4d1 WriteProcessMemory 36056->36058 36059 6e3b4d8 WriteProcessMemory 36056->36059 36057 6e3d00c 36058->36057 36059->36057 36061 6e3cb89 36060->36061 36062 6e3cb9e 36060->36062 36063 6e3ae50 ResumeThread 36061->36063 36064 6e3ae58 ResumeThread 36061->36064 36063->36062 36064->36062 36066 6e3cb78 36065->36066 36068 6e3ae50 ResumeThread 36066->36068 36069 6e3ae58 ResumeThread 36066->36069 36067 6e3cb9e 36068->36067 36069->36067 36071 6e3cc0c 36070->36071 36072 6e3cf86 36071->36072 36073 6e3b4d1 WriteProcessMemory 36071->36073 36074 6e3b4d8 WriteProcessMemory 36071->36074 36072->35947 36073->36071 36074->36071 36076 6e3ca81 36075->36076 36077 6e3d0f5 36076->36077 36078 6e3b411 VirtualAllocEx 36076->36078 36079 6e3b418 VirtualAllocEx 36076->36079 36078->36076 36079->36076 36081 6e3d04d 36080->36081 36082 6e3b5c0 ReadProcessMemory 36080->36082 36083 6e3b5c8 ReadProcessMemory 36080->36083 36081->35947 36082->36081 36083->36081 36086 6e3ca81 36084->36086 36085 6e3d0f5 36086->36085 36087 6e3b411 VirtualAllocEx 36086->36087 36088 6e3b418 VirtualAllocEx 36086->36088 36087->36086 36088->36086 36090 6e3cace 36089->36090 36092 6e3b4d1 WriteProcessMemory 36090->36092 36093 6e3b4d8 WriteProcessMemory 36090->36093 36091 6e3cf0d 36092->36091 36093->36091 36148 6e3b760 36094->36148 36152 6e3b754 36094->36152 36099 6e3b418 VirtualAllocEx 36098->36099 36101 6e3b495 36099->36101 36101->36007 36103 6e3b41e VirtualAllocEx 36102->36103 36105 6e3b495 36103->36105 36105->36007 36107 6e3b4d8 WriteProcessMemory 36106->36107 36109 6e3b577 36107->36109 36109->36013 36111 6e3b4de WriteProcessMemory 36110->36111 36113 6e3b577 36111->36113 36113->36013 36115 6e3ae58 ResumeThread 36114->36115 36117 6e3aec9 36115->36117 36117->36019 36119 6e3ae5e ResumeThread 36118->36119 36121 6e3aec9 36119->36121 36121->36019 36123 6e3d790 36122->36123 36132 6e3af00 36123->36132 36136 6e3af08 36123->36136 36124 6e3d7bb 36124->36018 36128 6e3d7a5 36127->36128 36130 6e3af00 Wow64SetThreadContext 36128->36130 36131 6e3af08 Wow64SetThreadContext 36128->36131 36129 6e3d7bb 36129->36018 36130->36129 36131->36129 36133 6e3af4d Wow64SetThreadContext 36132->36133 36135 6e3af95 36133->36135 36135->36124 36137 6e3af4d Wow64SetThreadContext 36136->36137 36139 6e3af95 36137->36139 36139->36124 36141 6e3b5c8 ReadProcessMemory 36140->36141 36143 6e3b657 36141->36143 36143->36032 36145 6e3b5ce ReadProcessMemory 36144->36145 36147 6e3b657 36145->36147 36147->36032 36149 6e3b7e9 36148->36149 36149->36149 36150 6e3b94e CreateProcessA 36149->36150 36151 6e3b9ab 36150->36151 36153 6e3b760 CreateProcessA 36152->36153 36155 6e3b9ab 36153->36155 35858 244cbc8 35859 244cc0e 35858->35859 35862 244cda8 35859->35862 35865 244bf48 35862->35865 35866 244ce10 DuplicateHandle 35865->35866 35867 244ccfb 35866->35867 35886 2444668 35887 244467a 35886->35887 35888 2444686 35887->35888 35892 2444778 35887->35892 35897 2443e40 35888->35897 35890 24446a5 35893 244479d 35892->35893 35901 2444888 35893->35901 35905 2444879 35893->35905 35898 2443e4b 35897->35898 35913 244803c 35898->35913 35900 2448420 35900->35890 35903 24448af 35901->35903 35902 244498c 35903->35902 35909 24444c4 35903->35909 35907 24448af 35905->35907 35906 244498c 35906->35906 35907->35906 35908 24444c4 CreateActCtxA 35907->35908 35908->35906 35910 2445918 CreateActCtxA 35909->35910 35912 24459db 35910->35912 35914 2448047 35913->35914 35915 244809c GetModuleHandleW 35914->35915 35916 2448736 35915->35916 35916->35900
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 090156e352d96584d554e584315c885149269da37ea7074cd10f52cbc6048152
                                                                        • Instruction ID: 62a0b9e00ca0cf3b361d90258a4b467a20fd774c45f6c2537f12f496d28b6ae3
                                                                        • Opcode Fuzzy Hash: 090156e352d96584d554e584315c885149269da37ea7074cd10f52cbc6048152
                                                                        • Instruction Fuzzy Hash: E2327B31B013148FEB59DB69C558BAEBBF7AF88704F14446AE1469B3A1CB35ED01CB50

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 666 6e3b754-6e3b7f5 669 6e3b7f7-6e3b801 666->669 670 6e3b82e-6e3b84e 666->670 669->670 671 6e3b803-6e3b805 669->671 677 6e3b850-6e3b85a 670->677 678 6e3b887-6e3b8b6 670->678 672 6e3b807-6e3b811 671->672 673 6e3b828-6e3b82b 671->673 675 6e3b813 672->675 676 6e3b815-6e3b824 672->676 673->670 675->676 676->676 679 6e3b826 676->679 677->678 680 6e3b85c-6e3b85e 677->680 686 6e3b8b8-6e3b8c2 678->686 687 6e3b8ef-6e3b9a9 CreateProcessA 678->687 679->673 682 6e3b881-6e3b884 680->682 683 6e3b860-6e3b86a 680->683 682->678 684 6e3b86e-6e3b87d 683->684 685 6e3b86c 683->685 684->684 688 6e3b87f 684->688 685->684 686->687 689 6e3b8c4-6e3b8c6 686->689 698 6e3b9b2-6e3ba38 687->698 699 6e3b9ab-6e3b9b1 687->699 688->682 691 6e3b8e9-6e3b8ec 689->691 692 6e3b8c8-6e3b8d2 689->692 691->687 693 6e3b8d6-6e3b8e5 692->693 694 6e3b8d4 692->694 693->693 696 6e3b8e7 693->696 694->693 696->691 709 6e3ba3a-6e3ba3e 698->709 710 6e3ba48-6e3ba4c 698->710 699->698 709->710 711 6e3ba40 709->711 712 6e3ba4e-6e3ba52 710->712 713 6e3ba5c-6e3ba60 710->713 711->710 712->713 716 6e3ba54 712->716 714 6e3ba62-6e3ba66 713->714 715 6e3ba70-6e3ba74 713->715 714->715 717 6e3ba68 714->717 718 6e3ba86-6e3ba8d 715->718 719 6e3ba76-6e3ba7c 715->719 716->713 717->715 720 6e3baa4 718->720 721 6e3ba8f-6e3ba9e 718->721 719->718 723 6e3baa5 720->723 721->720 723->723
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E3B996
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: 3b3afc97d148978aad35645ccd5f184c89c5ce54e7fc5031c2a0f57e30b2a48f
                                                                        • Instruction ID: be513951314bbbb4d6a218c0f95e96d3ce35f4f86d9f8b43d481e4d86a52fa1c
                                                                        • Opcode Fuzzy Hash: 3b3afc97d148978aad35645ccd5f184c89c5ce54e7fc5031c2a0f57e30b2a48f
                                                                        • Instruction Fuzzy Hash: 24A18B70D0032ADFDB60CF68C8457EEBBB2BF48314F0485AAE809A7250DB749985CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 724 6e3b760-6e3b7f5 726 6e3b7f7-6e3b801 724->726 727 6e3b82e-6e3b84e 724->727 726->727 728 6e3b803-6e3b805 726->728 734 6e3b850-6e3b85a 727->734 735 6e3b887-6e3b8b6 727->735 729 6e3b807-6e3b811 728->729 730 6e3b828-6e3b82b 728->730 732 6e3b813 729->732 733 6e3b815-6e3b824 729->733 730->727 732->733 733->733 736 6e3b826 733->736 734->735 737 6e3b85c-6e3b85e 734->737 743 6e3b8b8-6e3b8c2 735->743 744 6e3b8ef-6e3b9a9 CreateProcessA 735->744 736->730 739 6e3b881-6e3b884 737->739 740 6e3b860-6e3b86a 737->740 739->735 741 6e3b86e-6e3b87d 740->741 742 6e3b86c 740->742 741->741 745 6e3b87f 741->745 742->741 743->744 746 6e3b8c4-6e3b8c6 743->746 755 6e3b9b2-6e3ba38 744->755 756 6e3b9ab-6e3b9b1 744->756 745->739 748 6e3b8e9-6e3b8ec 746->748 749 6e3b8c8-6e3b8d2 746->749 748->744 750 6e3b8d6-6e3b8e5 749->750 751 6e3b8d4 749->751 750->750 753 6e3b8e7 750->753 751->750 753->748 766 6e3ba3a-6e3ba3e 755->766 767 6e3ba48-6e3ba4c 755->767 756->755 766->767 768 6e3ba40 766->768 769 6e3ba4e-6e3ba52 767->769 770 6e3ba5c-6e3ba60 767->770 768->767 769->770 773 6e3ba54 769->773 771 6e3ba62-6e3ba66 770->771 772 6e3ba70-6e3ba74 770->772 771->772 774 6e3ba68 771->774 775 6e3ba86-6e3ba8d 772->775 776 6e3ba76-6e3ba7c 772->776 773->770 774->772 777 6e3baa4 775->777 778 6e3ba8f-6e3ba9e 775->778 776->775 780 6e3baa5 777->780 778->777 780->780
                                                                        APIs
                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06E3B996
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcess
                                                                        • String ID:
                                                                        • API String ID: 963392458-0
                                                                        • Opcode ID: a7a121313bcbe8830a5c782c4f403404adcd6fe85196f9888e4fb24fd40a2450
                                                                        • Instruction ID: 5395851f1a5f7729c23da0179c414c6082a4d414fe596de60d5c5c6ba8eeb803
                                                                        • Opcode Fuzzy Hash: a7a121313bcbe8830a5c782c4f403404adcd6fe85196f9888e4fb24fd40a2450
                                                                        • Instruction Fuzzy Hash: D0917A71D0072ACFDB60DF68C8457EEBBB2BF48314F0485AAE849A7250DB749985CF91

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 781 244b910-244b91f 782 244b921-244b92e call 244a8a4 781->782 783 244b94b-244b94f 781->783 790 244b944 782->790 791 244b930-244b93e call 244bfa8 782->791 785 244b951-244b95b 783->785 786 244b963-244b9a4 783->786 785->786 792 244b9a6-244b9ae 786->792 793 244b9b1-244b9bf 786->793 790->783 791->790 799 244ba80-244bb40 791->799 792->793 794 244b9c1-244b9c6 793->794 795 244b9e3-244b9e5 793->795 797 244b9d1 794->797 798 244b9c8-244b9cf call 244a8b0 794->798 800 244b9e8-244b9ef 795->800 804 244b9d3-244b9e1 797->804 798->804 831 244bb42-244bb45 799->831 832 244bb48-244bb73 GetModuleHandleW 799->832 801 244b9f1-244b9f9 800->801 802 244b9fc-244ba03 800->802 801->802 805 244ba05-244ba0d 802->805 806 244ba10-244ba19 call 244a8c0 802->806 804->800 805->806 812 244ba26-244ba2b 806->812 813 244ba1b-244ba23 806->813 814 244ba2d-244ba34 812->814 815 244ba49-244ba50 call 244c2a8 812->815 813->812 814->815 817 244ba36-244ba46 call 244a8d0 call 244a8e0 814->817 818 244ba53-244ba56 815->818 817->815 821 244ba58-244ba76 818->821 822 244ba79-244ba7f 818->822 821->822 831->832 833 244bb75-244bb7b 832->833 834 244bb7c-244bb90 832->834 833->834
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0244BB66
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702965005.0000000002440000.00000040.00000800.00020000.00000000.sdmp, Offset: 02440000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2440000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 564cf8632f64c80f84aa3d96fbe5081b1a25cc6f5f3a16bd791d47b9aa5becb7
                                                                        • Instruction ID: 77f19a08d74b44abc0e33ef6a023b76fbb86a33213a56c75692d9f3b5f6cf4c8
                                                                        • Opcode Fuzzy Hash: 564cf8632f64c80f84aa3d96fbe5081b1a25cc6f5f3a16bd791d47b9aa5becb7
                                                                        • Instruction Fuzzy Hash: 8A710270A00B458FE724DF6AD54175BBBF1FB48218F00892AD48697B50DB75E849CB90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 946 4a91254-4a942fc 949 4a943ac-4a943cc call 4a9112c 946->949 950 4a94302-4a94307 946->950 957 4a943cf-4a943dc 949->957 952 4a94309-4a94340 950->952 953 4a9435a-4a94392 CallWindowProcW 950->953 959 4a94349-4a94358 952->959 960 4a94342-4a94348 952->960 955 4a9439b-4a943aa 953->955 956 4a94394-4a9439a 953->956 955->957 956->955 959->957 960->959
                                                                        APIs
                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 04A94381
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1705192172.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_4a90000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: eda9d46e824cdbca2b00936207ead7f71cb24521901991a575caba8acbc8c2ba
                                                                        • Instruction ID: a07601ca780b9568680e49e9ca85b1575f564670a5b142bc0c3554abad7e8285
                                                                        • Opcode Fuzzy Hash: eda9d46e824cdbca2b00936207ead7f71cb24521901991a575caba8acbc8c2ba
                                                                        • Instruction Fuzzy Hash: 004114B4A04209DFDB14CF99C488AABBBF5FB88314F24C459D519AB321D774A841CFA0

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 963 24444c4-24459d9 CreateActCtxA 966 24459e2-2445a3c 963->966 967 24459db-24459e1 963->967 974 2445a3e-2445a41 966->974 975 2445a4b-2445a4f 966->975 967->966 974->975 976 2445a60 975->976 977 2445a51-2445a5d 975->977 979 2445a61 976->979 977->976 979->979
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 024459C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702965005.0000000002440000.00000040.00000800.00020000.00000000.sdmp, Offset: 02440000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2440000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: 2ff1f8fa3cd5b1f80b9cc71a173749013186d61b6fce21d0cbee69c9a32ec52c
                                                                        • Instruction ID: e6570a0fe80a4ba4ff008d1e8d81dcf35721528586c5c52d16f60507cf031fe2
                                                                        • Opcode Fuzzy Hash: 2ff1f8fa3cd5b1f80b9cc71a173749013186d61b6fce21d0cbee69c9a32ec52c
                                                                        • Instruction Fuzzy Hash: 1341D2B0C0061DCBEB24DFA9C88479EBBB5BF49304F64816AD408AB255DB756989CF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 980 244590d-24459d9 CreateActCtxA 982 24459e2-2445a3c 980->982 983 24459db-24459e1 980->983 990 2445a3e-2445a41 982->990 991 2445a4b-2445a4f 982->991 983->982 990->991 992 2445a60 991->992 993 2445a51-2445a5d 991->993 995 2445a61 992->995 993->992 995->995
                                                                        APIs
                                                                        • CreateActCtxA.KERNEL32(?), ref: 024459C9
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702965005.0000000002440000.00000040.00000800.00020000.00000000.sdmp, Offset: 02440000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2440000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: Create
                                                                        • String ID:
                                                                        • API String ID: 2289755597-0
                                                                        • Opcode ID: a7adee93adc180660d4fc654a09699a6ae2908b210c5e753a446ba21ae22e7d3
                                                                        • Instruction ID: 0ae0d9f3202fd57ee8d1b97477db4be5a1a6cdb4eeedc0a7c7085ff728f1532a
                                                                        • Opcode Fuzzy Hash: a7adee93adc180660d4fc654a09699a6ae2908b210c5e753a446ba21ae22e7d3
                                                                        • Instruction Fuzzy Hash: 844104B0C00619CFEB24CFA9C9847CEBBF5BF49304F24816AD448AB251DB756989CF90

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 996 6e3b4d1-6e3b4d6 997 6e3b4d8-6e3b4dd 996->997 998 6e3b4de-6e3b526 996->998 997->998 1000 6e3b536-6e3b575 WriteProcessMemory 998->1000 1001 6e3b528-6e3b534 998->1001 1003 6e3b577-6e3b57d 1000->1003 1004 6e3b57e-6e3b5ae 1000->1004 1001->1000 1003->1004
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E3B568
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: b299f91096a5210f1f36558d384ce98342eb1b6a4aeea145e8ab351d4936b874
                                                                        • Instruction ID: ccffb860787f2ef357b19a7f6c9885ad7a06f07a14a933ec9fe2089067d0f595
                                                                        • Opcode Fuzzy Hash: b299f91096a5210f1f36558d384ce98342eb1b6a4aeea145e8ab351d4936b874
                                                                        • Instruction Fuzzy Hash: 8F2146B190035D9FCB10DFA9C885BDEBBF5FF88310F10842AE919A7250D7789944CBA4
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06E3B568
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: dce2da2b38dbef29729c4574bb97dde92a4e4abbf304e0324493aeedc8321a27
                                                                        • Instruction ID: 28ee3bc404e9362fe685c543266f495d625649792f09555c09d047f4658ef3c6
                                                                        • Opcode Fuzzy Hash: dce2da2b38dbef29729c4574bb97dde92a4e4abbf304e0324493aeedc8321a27
                                                                        • Instruction Fuzzy Hash: BA2125B19003599FCB10DFA9C885BDEBBF5FF48314F10842AE959A7250C7789944CBA4
                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E3B648
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: 7fc37b911e2068ad84d3aeacecf27b7de03887c8cd0c2a638b65c55ca211dcf4
                                                                        • Instruction ID: cc7340eb4162193dc40da2a9eae6f4a8e1fe99a8cae128a42c8a87c6cd308011
                                                                        • Opcode Fuzzy Hash: 7fc37b911e2068ad84d3aeacecf27b7de03887c8cd0c2a638b65c55ca211dcf4
                                                                        • Instruction Fuzzy Hash: 422136B18003599FCB10DFAAC845ADEFBF5FF88320F10842AE919A7250C7749941CBA5
                                                                        APIs
                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E3AF86
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThreadWow64
                                                                        • String ID:
                                                                        • API String ID: 983334009-0
                                                                        • Opcode ID: ba3b0c73c3d00530fdb5c5042be0c055e1296fb11744d65479b506c143e48461
                                                                        • Instruction ID: cd13216706f17e11a522cd8cb7e6a0a254fd116dc707c4de4513520b767a49cc
                                                                        • Opcode Fuzzy Hash: ba3b0c73c3d00530fdb5c5042be0c055e1296fb11744d65479b506c143e48461
                                                                        • Instruction Fuzzy Hash: F0213AB1D003198FDB10DFAAC4857EEBBF5EF49324F108429D859A7240DB789985CFA5
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0244CDD6,?,?,?,?,?), ref: 0244CE97
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702965005.0000000002440000.00000040.00000800.00020000.00000000.sdmp, Offset: 02440000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2440000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 955982146bd9a8e066962e791d96a8d1bea845d06c20f1a45d4e513e4a0854c1
                                                                        • Instruction ID: 39896b60fd9f5468b2a3c77bd16d03f9294c038a75dc41bd8493558798376d06
                                                                        • Opcode Fuzzy Hash: 955982146bd9a8e066962e791d96a8d1bea845d06c20f1a45d4e513e4a0854c1
                                                                        • Instruction Fuzzy Hash: D02114B5901208DFDB10CF9AD984ADEBBF9EB48320F14841AE918A3310D774A950CFA4
                                                                        APIs
                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06E3B648
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessRead
                                                                        • String ID:
                                                                        • API String ID: 1726664587-0
                                                                        • Opcode ID: c7907c05609b0b4c3d80f80344e060632e427519d19d2a827d9ab8658413029e
                                                                        • Instruction ID: 319c1b9519c3e3bda40b9cc2b77053c5b3ce2388a25aa4c9a64f2d472883d3f5
                                                                        • Opcode Fuzzy Hash: c7907c05609b0b4c3d80f80344e060632e427519d19d2a827d9ab8658413029e
                                                                        • Instruction Fuzzy Hash: D52128B18003599FCB10DFAAC845ADEFBF5FF48320F10842AE559A7250C7749544CBA4
                                                                        APIs
                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06E3AF86
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThreadWow64
                                                                        • String ID:
                                                                        • API String ID: 983334009-0
                                                                        • Opcode ID: 91d628e8b8c60173e47fe16a76d51cb22fdc111c1edfa749773357dd45234dc8
                                                                        • Instruction ID: 6f0efcacd3fbe81520c93440aa7d40ea75d5214ff8e9c1c09d18830e4971d76f
                                                                        • Opcode Fuzzy Hash: 91d628e8b8c60173e47fe16a76d51cb22fdc111c1edfa749773357dd45234dc8
                                                                        • Instruction Fuzzy Hash: AD2138B1D003198FDB10DFAAC4857EEBBF4EF89324F108429D459A7240CB78A985CFA4
                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E3B486
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: dcd99bdcf9aa82f7e18a2d969e84cfede989e671bc3dbbaa4babfac3210077df
                                                                        • Instruction ID: 28318bfee0b9de82221d19fb9a5037ac34659190b04a78ed7e55f8d2ca9e1fa2
                                                                        • Opcode Fuzzy Hash: dcd99bdcf9aa82f7e18a2d969e84cfede989e671bc3dbbaa4babfac3210077df
                                                                        • Instruction Fuzzy Hash: 7E1156718003499FCB10DFAAC845ADFBFF5EB88320F208829E519A7250C775A944CFA4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: 20292b211ddb8350589e09b216853c2cbd0da971f4cc3c37c962c18858959a37
                                                                        • Instruction ID: fd2f9bd8bb908bf21906eab6ede92a5ec33da2b8f4c853202a77c1e08ca6f778
                                                                        • Opcode Fuzzy Hash: 20292b211ddb8350589e09b216853c2cbd0da971f4cc3c37c962c18858959a37
                                                                        • Instruction Fuzzy Hash: 431167B18003598ACB20DFAAC4497DFFFF5AB88324F20842AD459A7250CA74A480CBA4
                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06E3B486
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: 816fc994ccc08681ecf34fd1a0cc967538ed40f116b4fe4bd2226026b0412b96
                                                                        • Instruction ID: 41f19d7dd38bb04059b332c2181f6974a1bbf1022b12ec10c01a678a98662a56
                                                                        • Opcode Fuzzy Hash: 816fc994ccc08681ecf34fd1a0cc967538ed40f116b4fe4bd2226026b0412b96
                                                                        • Instruction Fuzzy Hash: 8E1137719003499FCB10DFAAC845BDEBFF5EF89324F108419E559A7250C775A944CFA4
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: ae15b0ffab98604284f9a66943fea9be3e67f0a65de514116215f811af6a758c
                                                                        • Instruction ID: 3faf8aa07debade86ea174234ac1728bfcdca957d87f53e7c46df29997273d54
                                                                        • Opcode Fuzzy Hash: ae15b0ffab98604284f9a66943fea9be3e67f0a65de514116215f811af6a758c
                                                                        • Instruction Fuzzy Hash: B8113AB1D003588FCB10DFAAC4497DEFBF5EB88324F248429D459A7250CB75A984CFA4
                                                                        APIs
                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 0244BB66
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702965005.0000000002440000.00000040.00000800.00020000.00000000.sdmp, Offset: 02440000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2440000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule
                                                                        • String ID:
                                                                        • API String ID: 4139908857-0
                                                                        • Opcode ID: 21cc93c07697cce8c3b5154d39a7724be89555fb94758c40437fdc5ef7df7345
                                                                        • Instruction ID: c6b86f3e6c8613b6136d71a261e53c10ad8a3bd3feed5e367a6da3a2daf29c84
                                                                        • Opcode Fuzzy Hash: 21cc93c07697cce8c3b5154d39a7724be89555fb94758c40437fdc5ef7df7345
                                                                        • Instruction Fuzzy Hash: 5D1110B5C002498FDB10DF9AC844ADEFBF4EB89324F10846AD858B7610C775A545CFA5
                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E3DB1D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: a7ed01b55f5ad3032bb58ad6f6505b8fce41f38c465ce9cb62d23446f969d579
                                                                        • Instruction ID: 18a1620f022d911b404108ddd231c6286ab27fda2a53e26cd4a000d278e9c2a8
                                                                        • Opcode Fuzzy Hash: a7ed01b55f5ad3032bb58ad6f6505b8fce41f38c465ce9cb62d23446f969d579
                                                                        • Instruction Fuzzy Hash: 6C1133B5800358DFDB10DF8AC849BDEBBF8EB48320F108419E919B7210C374A980CFA4
                                                                        APIs
                                                                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 06E3DB1D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost
                                                                        • String ID:
                                                                        • API String ID: 410705778-0
                                                                        • Opcode ID: 1edf3cb488241e9d4aeae881b06b13ccb5757ef271dd693894d421994b446b09
                                                                        • Instruction ID: 814bfac41ef37d00d804cc9baf7f407f01a73ffbd89fe4be8eeb1a0a1de14e14
                                                                        • Opcode Fuzzy Hash: 1edf3cb488241e9d4aeae881b06b13ccb5757ef271dd693894d421994b446b09
                                                                        • Instruction Fuzzy Hash: 8311F2B58003489FDB10DF9AD849BDEBBF8EB48320F10845AE958A7250C375A984CFA5
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702704399.000000000228D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0228D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_228d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 801a508f01f5eed0367f7d0484e8863e6c3c3447245af8a8c3eb56e087349aba
                                                                        • Instruction ID: e0a40de0a1f0710ad5f522786c5774084b53e2d4e4b77d130573164c147aae20
                                                                        • Opcode Fuzzy Hash: 801a508f01f5eed0367f7d0484e8863e6c3c3447245af8a8c3eb56e087349aba
                                                                        • Instruction Fuzzy Hash: C7212571510240DFDB05EF64D9C0F27BFA5FB88318F20C56AE8094B2DAC33AD45ACAA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702704399.000000000228D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0228D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_228d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: ff8f20a551b3fedadc06ce56fd18505d183c6de022e25578f1618b85c58b207e
                                                                        • Instruction ID: 5d4b10a1cbeab42b8ca189c25cf5de109c7d585cdbd269178a40a83c37ba21cf
                                                                        • Opcode Fuzzy Hash: ff8f20a551b3fedadc06ce56fd18505d183c6de022e25578f1618b85c58b207e
                                                                        • Instruction Fuzzy Hash: 16212875510204DFDB09EF64D9C0B16BF65FB94324F20C169D9094B2DAC376E45ACAA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702757052.000000000229D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0229D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_229d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 524a03905ce107b05842508bc75d1b2e605e08f6c91d731dcb55fdec7f1190e8
                                                                        • Instruction ID: f59437bc5eac2b09f09d9bc445e589046bfdd69ec596a53fc620b3f2052cfdb6
                                                                        • Opcode Fuzzy Hash: 524a03905ce107b05842508bc75d1b2e605e08f6c91d731dcb55fdec7f1190e8
                                                                        • Instruction Fuzzy Hash: 1C212271614200DFDF14EF64D984B26BBA5FB84314F20C56DD80A4B25AC37BD447DA61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702757052.000000000229D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0229D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_229d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 30356beac289a7b38ecd7b060c6576ad25c810269d026f1c2e13a5578c4a686e
                                                                        • Instruction ID: 0b52a4cdd80ac6869d58f81a67ee1e23767569005dd1c823e3077f85d1d21a0f
                                                                        • Opcode Fuzzy Hash: 30356beac289a7b38ecd7b060c6576ad25c810269d026f1c2e13a5578c4a686e
                                                                        • Instruction Fuzzy Hash: 69214971914200DFDF05EF94C6C0B26BBA5FB84314F20C56DD8094B29AC3B6D446DA61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702757052.000000000229D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0229D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_229d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3088c0ec5e7e9046fbc3d1eb5a71f5d8d818eeabbcf8559fea00e8da29ec0afa
                                                                        • Instruction ID: ba86e602c60daee7becccbf53d4c3387797205882cd8e7fc42a236644a9aacde
                                                                        • Opcode Fuzzy Hash: 3088c0ec5e7e9046fbc3d1eb5a71f5d8d818eeabbcf8559fea00e8da29ec0afa
                                                                        • Instruction Fuzzy Hash: 33219F755093C08FDB02DF64D994715BF71EB46314F28C5EAD8498F2A7C33A980ADB62
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702704399.000000000228D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0228D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_228d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                        • Instruction ID: a5f5aec44edacad453b430a14131fe3bf0575d49c2162e921133f851dbdc94ed
                                                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                        • Instruction Fuzzy Hash: D411E676504280DFCB16DF54D5C4B16BFB1FB84318F24C6AADC490B69AC33AD45ACBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702704399.000000000228D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0228D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_228d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                        • Instruction ID: 5f67f44008f37d45a3e406fd724ebd88a40d28193d47b36d47541dbaa94b331f
                                                                        • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                        • Instruction Fuzzy Hash: DB112676404280DFCB06DF50D5C4B16BF71FB94324F24C2A9DC090B29AC33AE45ACBA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702757052.000000000229D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0229D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_229d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                        • Instruction ID: d79dc42fcf9a5a2f00fec7e44df443e43afced3359c45b72dd54449675b8c14f
                                                                        • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                        • Instruction Fuzzy Hash: 0211BB75904280DFDB02DF50C5C4B15BBA1FB84218F24C6AAD8494B29AC37AD40ADB61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702704399.000000000228D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0228D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_228d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dd7e95a5d58d862d857696cecd87580bca0d00b2c2957c535c42e13137d3361e
                                                                        • Instruction ID: fc5779548aca7f928268eca70618e838bcf07a04a4620eeab86b69b7c6f9fc75
                                                                        • Opcode Fuzzy Hash: dd7e95a5d58d862d857696cecd87580bca0d00b2c2957c535c42e13137d3361e
                                                                        • Instruction Fuzzy Hash: 55012B3101A3409AE7106B79CD847A7FFD8EF41324F18C82AED084A2CAC779D844C6B1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702704399.000000000228D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0228D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_228d000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fdba43d690930faa4760085bd73d15ee53461c8982c4ce5e958a938abeeb8d40
                                                                        • Instruction ID: 87a522d32891b2ec68b46c4e9ea5d35dcc63662027851922d152c6c670908905
                                                                        • Opcode Fuzzy Hash: fdba43d690930faa4760085bd73d15ee53461c8982c4ce5e958a938abeeb8d40
                                                                        • Instruction Fuzzy Hash: 0DF096714053449EE7109B1ADCC4BA2FFA8EF51734F18C45AED085F2CAC3799844CAB1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: dfc5819723704b4227d4e469275d8e5cdc03f5cc21f6a11c93cb82e61b0e3fc6
                                                                        • Instruction ID: 063d79716d87510776e6e8ec95fe39c5a688710d49d6991ab5407f209e588f35
                                                                        • Opcode Fuzzy Hash: dfc5819723704b4227d4e469275d8e5cdc03f5cc21f6a11c93cb82e61b0e3fc6
                                                                        • Instruction Fuzzy Hash: 88E11974E002298FDB14DFA9C5849AEFBF2FF89304F249169E415AB356DB30A941CF61
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1705192172.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_4a90000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f0a74e209fe87c63321fdf031b66e4fa9a14d802c1e189bbd7b2076e9ed98691
                                                                        • Instruction ID: d267a1aa81753e575142273aef18cc9fc7fdfcbacbf4893adbbe3d774bfa604d
                                                                        • Opcode Fuzzy Hash: f0a74e209fe87c63321fdf031b66e4fa9a14d802c1e189bbd7b2076e9ed98691
                                                                        • Instruction Fuzzy Hash: 3512A4B0409745AAD310CFA7E95C2893FB1FB4533CB524229D2616E2E5DBBC998ACF44
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: da3ac631bfd6281cd368e68d38d1cebc9ae38469b4f215f1b011e4d8f9c4ca2a
                                                                        • Instruction ID: b7ee65a8ed8a5800f6196b006931690928dbc278770f36fbbb438c055ce7d83c
                                                                        • Opcode Fuzzy Hash: da3ac631bfd6281cd368e68d38d1cebc9ae38469b4f215f1b011e4d8f9c4ca2a
                                                                        • Instruction Fuzzy Hash: D8E11A74E002198FDB14DF99C5849AEFBF2BF88304F24D169E455AB359DB31A981CF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6428952bc20219eb4f9689208e05fb4ca2cc9f2cdfbed763156b6ed80e4d1810
                                                                        • Instruction ID: da8f31252be7ef6f6f90789fb9d93765d4543706ab52335412711597a5f49d37
                                                                        • Opcode Fuzzy Hash: 6428952bc20219eb4f9689208e05fb4ca2cc9f2cdfbed763156b6ed80e4d1810
                                                                        • Instruction Fuzzy Hash: 93E10A74E002198FDB54DFA9C5849AEFBF2BF88304F24D169E415AB359DB30A941CFA1
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fb80797f5cbcfad25a326240e3c2a529876bdda92e613a5f37bb455b394bd3f1
                                                                        • Instruction ID: 84b73c6ec4d0cc6390a81a3cf07a497818f8380302bb38a10894162a17ea8e28
                                                                        • Opcode Fuzzy Hash: fb80797f5cbcfad25a326240e3c2a529876bdda92e613a5f37bb455b394bd3f1
                                                                        • Instruction Fuzzy Hash: 7BE1E874E002298FDB14DFA9C5849AEFBF2FF89304F249169E415AB356DB31A941CF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8df28ea1b490ac597846596473e78baa97d25d416d0d4576ea83d010d4507d50
                                                                        • Instruction ID: b6e456397a0810b99611ee4a4cea589accf2f925e8f85a3e9c0d84e44d6feaf9
                                                                        • Opcode Fuzzy Hash: 8df28ea1b490ac597846596473e78baa97d25d416d0d4576ea83d010d4507d50
                                                                        • Instruction Fuzzy Hash: 38E13B74E002198FDB14DFA9C5849AEFBF2BF89304F24D169E405AB356DB70A941CF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5b65438fc410f9726f0d53638ad78efffa798a219224355c799b16d878a6ddfa
                                                                        • Instruction ID: 789c8aedc9af76326780695c7abad3e837ad15e38abd894b69bdff68a89a9eed
                                                                        • Opcode Fuzzy Hash: 5b65438fc410f9726f0d53638ad78efffa798a219224355c799b16d878a6ddfa
                                                                        • Instruction Fuzzy Hash: 05D1E931D2075ACACB11EBA4D950A9DB7B1EFD5300F10D79AD1097B225EB70AAC9CF81
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1702965005.0000000002440000.00000040.00000800.00020000.00000000.sdmp, Offset: 02440000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_2440000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: eb7d1f2ce691086572b3c59b0010a5536bd1699c62def6ec954327a947cad96d
                                                                        • Instruction ID: 6bdfc17bbce08b06f7c4a61bd42244d170d00dcf5a02f6582156bb380ace8b26
                                                                        • Opcode Fuzzy Hash: eb7d1f2ce691086572b3c59b0010a5536bd1699c62def6ec954327a947cad96d
                                                                        • Instruction Fuzzy Hash: 68A14B32E00219CFDF19DFA5C84059EBBB2FF84301B1545AAE806AB265DF35E946CF80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 89a033aa8b9de13f02d9f3710a1f2087f288ddb9c808b2608fb454ca7433afa9
                                                                        • Instruction ID: 41344f74f983376a57b47e2ca4976eaec4e78657cb19c7aad1f7b2fe1e72971d
                                                                        • Opcode Fuzzy Hash: 89a033aa8b9de13f02d9f3710a1f2087f288ddb9c808b2608fb454ca7433afa9
                                                                        • Instruction Fuzzy Hash: F1D1C835D2075ACACB10EBA4D950A9DB7B1EFD5300F10D79AD1097B225EB70AAC9CF81
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1705192172.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_4a90000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 239bc3a91d3b6636e7f0f1c18e8d54521c1225a0e4ba884693c25cdd4a13c4ef
                                                                        • Instruction ID: 84b1c58455b9dfda1d5deba012409cf01cc640241e27a172467f6bfa82172b4a
                                                                        • Opcode Fuzzy Hash: 239bc3a91d3b6636e7f0f1c18e8d54521c1225a0e4ba884693c25cdd4a13c4ef
                                                                        • Instruction Fuzzy Hash: 76C1F8B0808745AAD710DFA7E8581897FB1FB8533CF524229D2616F2E5DBBC5886CF44
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e649d5e8299eeda9493daadcedb11732ada4877df58738f73001017de35bd318
                                                                        • Instruction ID: 74f7f3bd40ef709d3c718359c336a6328f29dc032e59235627900b7c304ed21c
                                                                        • Opcode Fuzzy Hash: e649d5e8299eeda9493daadcedb11732ada4877df58738f73001017de35bd318
                                                                        • Instruction Fuzzy Hash: 1F514C70E002198FDB14CFA9D5845AEFBF2BF89304F24D169D418AB356DB319A81CFA0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1706871178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_6e30000_800399031-18.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 670438f6462b245ae4c2d6479807a0f02db75135a9ea4765eb4e1a08709037b3
                                                                        • Instruction ID: 99784181fafce081ca5a4c8fb2e37bb39776e7b84ae4e15ac33c2668e443e929
                                                                        • Opcode Fuzzy Hash: 670438f6462b245ae4c2d6479807a0f02db75135a9ea4765eb4e1a08709037b3
                                                                        • Instruction Fuzzy Hash: E5512A70E042298FDB14DFA9C9845AEFBF2BF89304F24C169D419AB256DB319941CFA1

                                                                        Execution Graph

                                                                        Execution Coverage:4%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:6%
                                                                        Total number of Nodes:1518
                                                                        Total number of Limit Nodes:55
                                                                        execution_graph 45238 42d6a2 45239 42d6ad 45238->45239 45241 42d6c1 45239->45241 45242 430ca3 45239->45242 45243 430cb2 45242->45243 45244 430cae 45242->45244 45246 43b6c1 45243->45246 45244->45241 45247 443697 45246->45247 45248 4436a4 45247->45248 45249 4436af 45247->45249 45265 443649 21 API calls 3 library calls 45248->45265 45251 4436b7 45249->45251 45257 4436c0 ___crtLCMapStringA 45249->45257 45259 443c92 45251->45259 45252 4436c5 45266 43ad91 20 API calls __dosmaperr 45252->45266 45253 4436ea RtlReAllocateHeap 45256 4436ac 45253->45256 45253->45257 45256->45244 45257->45252 45257->45253 45267 440480 7 API calls 2 library calls 45257->45267 45260 443c9d RtlFreeHeap 45259->45260 45261 443cc6 _free 45259->45261 45260->45261 45262 443cb2 45260->45262 45261->45256 45268 43ad91 20 API calls __dosmaperr 45262->45268 45264 443cb8 GetLastError 45264->45261 45265->45256 45266->45256 45267->45257 45268->45264 45269 424a00 45274 424a7d send 45269->45274 45275 41bd72 45277 41bd87 _Yarn ___scrt_get_show_window_mode 45275->45277 45276 41bf8a 45282 41bf3e 45276->45282 45289 41b917 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 45276->45289 45277->45276 45294 430c79 21 API calls _Yarn 45277->45294 45280 41bf9b 45280->45282 45290 430c79 21 API calls _Yarn 45280->45290 45281 41bf37 ___scrt_get_show_window_mode 45281->45282 45295 430c79 21 API calls _Yarn 45281->45295 45285 41bfd4 ___scrt_get_show_window_mode 45285->45282 45291 4312ff 45285->45291 45287 41bf64 ___scrt_get_show_window_mode 45287->45282 45296 430c79 21 API calls _Yarn 45287->45296 45289->45280 45290->45285 45297 43121e 45291->45297 45293 431307 45293->45282 45294->45281 45295->45287 45296->45276 45298 431237 45297->45298 45302 43122d 45297->45302 45298->45302 45303 430c79 21 API calls _Yarn 45298->45303 45300 431258 45300->45302 45304 4315ec CryptAcquireContextA 45300->45304 45302->45293 45303->45300 45305 431608 45304->45305 45306 43160d CryptGenRandom 45304->45306 45305->45302 45306->45305 45307 431622 CryptReleaseContext 45306->45307 45307->45305 45308 424991 45314 424a66 recv 45308->45314 45315 42479b 45317 4247b0 45315->45317 45323 424842 45315->45323 45316 4248d2 45318 4248f9 45316->45318 45316->45323 45331 423896 45316->45331 45317->45316 45317->45318 45319 4247fd 45317->45319 45320 424872 45317->45320 45317->45323 45325 4248a7 45317->45325 45327 424832 45317->45327 45343 422c92 48 API calls _Yarn 45317->45343 45318->45323 45348 423f0a 28 API calls 45318->45348 45319->45323 45319->45327 45344 41d921 51 API calls 45319->45344 45320->45323 45320->45325 45346 41d921 51 API calls 45320->45346 45325->45316 45347 4234a5 21 API calls 45325->45347 45327->45320 45327->45323 45345 422c92 48 API calls _Yarn 45327->45345 45332 4238b5 ___scrt_get_show_window_mode 45331->45332 45334 4238c4 45332->45334 45338 4238e9 45332->45338 45349 41c970 21 API calls 45332->45349 45334->45338 45342 4238c9 45334->45342 45350 41e38d 45 API calls 45334->45350 45337 4238d2 45337->45338 45353 422aba 21 API calls 2 library calls 45337->45353 45338->45318 45340 42396c 45340->45338 45351 430c79 21 API calls _Yarn 45340->45351 45342->45337 45342->45338 45352 41b814 48 API calls 45342->45352 45343->45319 45344->45319 45345->45320 45346->45320 45347->45316 45348->45323 45349->45334 45350->45340 45351->45342 45352->45337 45353->45338 45354 439be8 45357 439bf4 _swprintf ___DestructExceptionObject 45354->45357 45355 439c02 45370 43ad91 20 API calls __dosmaperr 45355->45370 45357->45355 45358 439c2c 45357->45358 45365 442d9a EnterCriticalSection 45358->45365 45360 439c07 ___DestructExceptionObject __cftof 45361 439c37 45366 439cd8 45361->45366 45365->45361 45368 439ce6 45366->45368 45367 439c42 45371 439c5f LeaveCriticalSection std::_Lockit::~_Lockit 45367->45371 45368->45367 45372 446c9b 36 API calls 2 library calls 45368->45372 45370->45360 45371->45360 45372->45368 45373 40163e 45374 401646 45373->45374 45375 401649 45373->45375 45376 401688 45375->45376 45379 401676 45375->45379 45381 43229f 45376->45381 45378 40167c 45380 43229f new 22 API calls 45379->45380 45380->45378 45387 4322a4 45381->45387 45383 4322d0 45383->45378 45387->45383 45388 439adb 45387->45388 45395 440480 7 API calls 2 library calls 45387->45395 45396 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45387->45396 45397 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 45387->45397 45393 443649 ___crtLCMapStringA 45388->45393 45389 443687 45399 43ad91 20 API calls __dosmaperr 45389->45399 45391 443672 RtlAllocateHeap 45392 443685 45391->45392 45391->45393 45392->45387 45393->45389 45393->45391 45398 440480 7 API calls 2 library calls 45393->45398 45395->45387 45398->45393 45399->45392 45400 4146ff 45415 41936b 45400->45415 45402 414708 45426 4020d6 45402->45426 45406 414723 45407 415654 45406->45407 45433 401fb8 45406->45433 45436 401e6d 45407->45436 45411 401fb8 11 API calls 45412 415669 45411->45412 45413 401fb8 11 API calls 45412->45413 45414 415675 45413->45414 45442 4020bf 45415->45442 45418 439adb _Yarn 21 API calls 45419 419389 InternetOpenW InternetOpenUrlW 45418->45419 45420 4193b0 InternetReadFile 45419->45420 45421 4193d3 45420->45421 45421->45420 45422 419400 InternetCloseHandle InternetCloseHandle 45421->45422 45425 401fb8 11 API calls 45421->45425 45446 402097 45421->45446 45424 419412 45422->45424 45424->45402 45425->45421 45427 4020ec 45426->45427 45428 4023ae 11 API calls 45427->45428 45429 402106 45428->45429 45430 402549 28 API calls 45429->45430 45431 402114 45430->45431 45432 404a81 60 API calls _Yarn 45431->45432 45432->45406 45434 4023ae 11 API calls 45433->45434 45435 401fc1 45434->45435 45435->45407 45437 402143 45436->45437 45441 40217f 45437->45441 45484 402710 11 API calls 45437->45484 45439 402164 45485 4026f2 11 API calls std::_Deallocate 45439->45485 45441->45411 45443 4020c7 45442->45443 45452 4023ae 45443->45452 45445 4020d2 45445->45418 45447 40209f 45446->45447 45448 4023ae 11 API calls 45447->45448 45449 4020aa 45448->45449 45457 4024ea 45449->45457 45451 4020b9 45451->45421 45453 402408 45452->45453 45454 4023b8 45452->45454 45453->45445 45454->45453 45456 402787 11 API calls std::_Deallocate 45454->45456 45456->45453 45458 4024fa 45457->45458 45459 402500 45458->45459 45460 402515 45458->45460 45464 402549 45459->45464 45474 4028c8 28 API calls 45460->45474 45463 402513 45463->45451 45475 402868 45464->45475 45466 40255d 45467 402572 45466->45467 45468 402587 45466->45468 45480 402a14 22 API calls 45467->45480 45482 4028c8 28 API calls 45468->45482 45471 40257b 45481 4029ba 22 API calls 45471->45481 45473 402585 45473->45463 45474->45463 45477 402870 45475->45477 45476 402878 45476->45466 45477->45476 45483 402c83 22 API calls 45477->45483 45480->45471 45481->45473 45482->45473 45484->45439 45485->45441 45486 43263c 45487 432648 ___DestructExceptionObject 45486->45487 45513 43234b 45487->45513 45489 43264f 45491 432678 45489->45491 45783 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 45489->45783 45498 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 45491->45498 45784 441763 5 API calls TranslatorGuardHandler 45491->45784 45493 432691 45494 432697 ___DestructExceptionObject 45493->45494 45785 441707 5 API calls TranslatorGuardHandler 45493->45785 45496 432717 45524 4328c9 45496->45524 45498->45496 45786 4408e7 35 API calls 4 library calls 45498->45786 45514 432354 45513->45514 45791 4329da IsProcessorFeaturePresent 45514->45791 45516 432360 45792 436cd1 10 API calls 4 library calls 45516->45792 45518 432365 45519 432369 45518->45519 45793 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45518->45793 45519->45489 45521 432372 45522 432380 45521->45522 45794 436cfa 8 API calls 3 library calls 45521->45794 45522->45489 45795 434c30 45524->45795 45526 4328dc GetStartupInfoW 45527 43271d 45526->45527 45528 4416b4 45527->45528 45797 44c239 45528->45797 45530 432726 45533 40d3f0 45530->45533 45531 4416bd 45531->45530 45801 443d25 35 API calls 45531->45801 45803 41a8da LoadLibraryA GetProcAddress 45533->45803 45535 40d40c 45810 40dd83 45535->45810 45537 40d415 45538 4020d6 28 API calls 45537->45538 45539 40d424 45538->45539 45540 4020d6 28 API calls 45539->45540 45541 40d433 45540->45541 45825 419d87 45541->45825 45545 40d445 45546 401e6d 11 API calls 45545->45546 45547 40d44e 45546->45547 45548 40d461 45547->45548 45549 40d4b8 45547->45549 46104 40e609 95 API calls 45548->46104 45851 401e45 45549->45851 45552 40d4c6 45556 401e45 22 API calls 45552->45556 45553 40d473 45554 401e45 22 API calls 45553->45554 45555 40d47f 45554->45555 46105 40f98d 36 API calls __EH_prolog 45555->46105 45557 40d4e5 45556->45557 45856 4052fe 45557->45856 45560 40d4f4 45861 408209 45560->45861 45561 40d491 46106 40e5ba 77 API calls 45561->46106 45565 40d49a 46107 40dd70 70 API calls 45565->46107 45570 401fb8 11 API calls 45572 40d517 45570->45572 45574 401fb8 11 API calls 45572->45574 45575 40d520 45574->45575 45576 401e45 22 API calls 45575->45576 45577 40d529 45576->45577 45875 401fa0 45577->45875 45579 40d534 45580 401e45 22 API calls 45579->45580 45581 40d54f 45580->45581 45582 401e45 22 API calls 45581->45582 45583 40d569 45582->45583 45584 40d5cf 45583->45584 46108 40822a 45583->46108 45585 401e45 22 API calls 45584->45585 45591 40d5dc 45585->45591 45587 40d594 45588 401fc2 28 API calls 45587->45588 45589 40d5a0 45588->45589 45592 401fb8 11 API calls 45589->45592 45590 40d650 45596 40d660 CreateMutexA GetLastError 45590->45596 45591->45590 45593 401e45 22 API calls 45591->45593 45594 40d5a9 45592->45594 45595 40d5f5 45593->45595 46113 411f34 RegOpenKeyExA 45594->46113 45599 40d5fc OpenMutexA 45595->45599 45597 40d991 45596->45597 45598 40d67f GetModuleFileNameW 45596->45598 45601 401fb8 11 API calls 45597->45601 45879 4192ae 45598->45879 45603 40d622 45599->45603 45604 40d60f WaitForSingleObject CloseHandle 45599->45604 45625 40d99a ___scrt_get_show_window_mode 45601->45625 45610 411f34 3 API calls 45603->45610 45604->45603 45607 40dd0f 46188 41239a 30 API calls 45607->46188 45608 40d6a0 45609 40d6f5 45608->45609 45611 401e45 22 API calls 45608->45611 45613 401e45 22 API calls 45609->45613 45617 40d63b 45610->45617 45619 40d6bf 45611->45619 45615 40d720 45613->45615 45614 40dd22 46189 410eda 65 API calls ___scrt_get_show_window_mode 45614->46189 45620 40d731 45615->45620 45621 40d72c 45615->45621 45617->45590 46116 41239a 30 API calls 45617->46116 45619->45609 45626 40d6f7 45619->45626 45633 40d6db 45619->45633 45624 401e45 22 API calls 45620->45624 46120 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 45621->46120 45622 402073 28 API calls 45627 40dd3a 45622->45627 45631 40d73a 45624->45631 46182 4120e8 RegOpenKeyExA 45625->46182 46118 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 45626->46118 46006 4052dd 45627->46006 45630 40dd4a 45634 402073 28 API calls 45630->45634 45639 401e45 22 API calls 45631->45639 45633->45609 46117 4067a0 36 API calls ___scrt_get_show_window_mode 45633->46117 45637 40dd59 45634->45637 45635 40d70d 45635->45609 45640 40d712 45635->45640 45638 4194da 79 API calls 45637->45638 45642 40dd5e 45638->45642 45643 40d755 45639->45643 46119 4066a6 58 API calls 45640->46119 45641 40d9ec 45645 401e45 22 API calls 45641->45645 45646 401fb8 11 API calls 45642->45646 45650 401e45 22 API calls 45643->45650 45647 40da10 45645->45647 45648 40dd6a 45646->45648 45906 402073 45647->45906 46008 413980 45648->46008 45653 40d76f 45650->45653 45652 40dd6f 45655 401e45 22 API calls 45653->45655 45654 40da22 45912 41215f RegCreateKeyA 45654->45912 45657 40d789 45655->45657 45660 401e45 22 API calls 45657->45660 45659 401e45 22 API calls 45661 40da44 45659->45661 45664 40d7a3 45660->45664 45918 439867 45661->45918 45663 40d810 45663->45625 45669 40d828 45663->45669 45702 40d8a7 ___scrt_get_show_window_mode 45663->45702 45664->45663 45666 401e45 22 API calls 45664->45666 45677 40d7b8 _wcslen 45666->45677 45667 40da61 46185 41aa4f 81 API calls ___scrt_get_show_window_mode 45667->46185 45668 40da7e 45671 402073 28 API calls 45668->45671 45672 401e45 22 API calls 45669->45672 45674 40da8d 45671->45674 45675 40d831 45672->45675 45673 40da70 CreateThread 45673->45668 45676 402073 28 API calls 45674->45676 45679 401e45 22 API calls 45675->45679 45678 40da9c 45676->45678 45677->45663 45683 401e45 22 API calls 45677->45683 45922 4194da 45678->45922 45681 40d843 45679->45681 45687 401e45 22 API calls 45681->45687 45685 40d7d3 45683->45685 45684 401e45 22 API calls 45686 40daad 45684->45686 45688 401e45 22 API calls 45685->45688 45691 401e45 22 API calls 45686->45691 45689 40d855 45687->45689 45690 40d7e8 45688->45690 45693 401e45 22 API calls 45689->45693 46121 40c5ed 45690->46121 45692 40dabf 45691->45692 45696 401e45 22 API calls 45692->45696 45695 40d87e 45693->45695 45701 401e45 22 API calls 45695->45701 45698 40dad5 45696->45698 45705 401e45 22 API calls 45698->45705 45699 401ef3 28 API calls 45700 40d807 45699->45700 45703 401ee9 11 API calls 45700->45703 45704 40d88f 45701->45704 45896 412338 45702->45896 45703->45663 46179 40b871 46 API calls _wcslen 45704->46179 45706 40daf5 45705->45706 45711 439867 39 API calls 45706->45711 45709 40d89f 45709->45702 45710 40d942 ctype 45713 401e45 22 API calls 45710->45713 45712 40db02 45711->45712 45714 401e45 22 API calls 45712->45714 45715 40d959 45713->45715 45716 40db0d 45714->45716 45715->45641 45718 40d96d 45715->45718 45717 401e45 22 API calls 45716->45717 45719 40db1e 45717->45719 45720 401e45 22 API calls 45718->45720 45946 408f1f 45719->45946 45721 40d976 45720->45721 46180 419bca 28 API calls 45721->46180 45724 40d982 46181 40de34 88 API calls 45724->46181 45727 401e45 22 API calls 45729 40db3c 45727->45729 45728 40d987 45728->45597 45728->45641 45730 40db83 45729->45730 45731 40db4a 45729->45731 45732 401e45 22 API calls 45730->45732 45733 43229f new 22 API calls 45731->45733 45734 40db91 45732->45734 45735 40db53 45733->45735 45738 40dbd9 45734->45738 45739 40db9c 45734->45739 45736 401e45 22 API calls 45735->45736 45737 40db65 45736->45737 45740 40db6c CreateThread 45737->45740 45742 401e45 22 API calls 45738->45742 45741 43229f new 22 API calls 45739->45741 45740->45730 47187 417f6a 100 API calls __EH_prolog 45740->47187 45744 40dba5 45741->45744 45743 40dbe2 45742->45743 45747 40dc4c 45743->45747 45748 40dbed 45743->45748 45745 401e45 22 API calls 45744->45745 45746 40dbb6 45745->45746 45751 40dbbd CreateThread 45746->45751 45749 401e45 22 API calls 45747->45749 45750 401e45 22 API calls 45748->45750 45752 40dc55 45749->45752 45753 40dbfc 45750->45753 45751->45738 47186 417f6a 100 API calls __EH_prolog 45751->47186 45754 40dc60 45752->45754 45755 40dc99 45752->45755 45756 401e45 22 API calls 45753->45756 45758 401e45 22 API calls 45754->45758 45983 4195f8 GetComputerNameExW GetUserNameW 45755->45983 45761 40dc11 45756->45761 45763 40dc69 45758->45763 46186 40c5a1 31 API calls 45761->46186 45766 401e45 22 API calls 45763->45766 45769 40dc7e 45766->45769 45767 40dc24 45770 401ef3 28 API calls 45767->45770 45777 439867 39 API calls 45769->45777 45773 40dc30 45770->45773 45771 40dcc1 SetProcessDEPPolicy 45772 40dcc4 CreateThread 45771->45772 45775 40dce5 45772->45775 45776 40dcd9 CreateThread 45772->45776 47156 40e18d 45772->47156 45774 401ee9 11 API calls 45773->45774 45778 40dc39 CreateThread 45774->45778 45779 40dcfa 45775->45779 45780 40dcee CreateThread 45775->45780 45776->45775 47183 410b5c 137 API calls 45776->47183 45781 40dc8b 45777->45781 45778->45747 47184 401bc9 49 API calls 45778->47184 45779->45622 45779->45648 45780->45779 47185 411140 38 API calls ___scrt_get_show_window_mode 45780->47185 46187 40b0a3 7 API calls 45781->46187 45783->45489 45784->45493 45785->45498 45786->45496 45791->45516 45792->45518 45793->45521 45794->45519 45796 434c47 45795->45796 45796->45526 45796->45796 45798 44c24b 45797->45798 45799 44c242 45797->45799 45798->45531 45802 44c138 48 API calls 4 library calls 45799->45802 45801->45531 45802->45798 45804 41a919 LoadLibraryA GetProcAddress 45803->45804 45805 41a909 GetModuleHandleA GetProcAddress 45803->45805 45806 41a947 GetModuleHandleA GetProcAddress 45804->45806 45807 41a937 GetModuleHandleA GetProcAddress 45804->45807 45805->45804 45808 41a973 24 API calls 45806->45808 45809 41a95f GetModuleHandleA GetProcAddress 45806->45809 45807->45806 45808->45535 45809->45808 46190 419493 FindResourceA 45810->46190 45813 439adb _Yarn 21 API calls 45814 40ddad _Yarn 45813->45814 45815 402097 28 API calls 45814->45815 45816 40ddc8 45815->45816 45817 401fc2 28 API calls 45816->45817 45818 40ddd3 45817->45818 45819 401fb8 11 API calls 45818->45819 45820 40dddc 45819->45820 45821 439adb _Yarn 21 API calls 45820->45821 45822 40dded _Yarn 45821->45822 46193 4062ee 45822->46193 45824 40de20 45824->45537 45826 4020bf 11 API calls 45825->45826 45846 419d9a 45826->45846 45827 419e0a 45828 401fb8 11 API calls 45827->45828 45829 419e3c 45828->45829 45831 401fb8 11 API calls 45829->45831 45830 419e0c 45832 404182 28 API calls 45830->45832 45834 419e44 45831->45834 45836 419e18 45832->45836 45835 401fb8 11 API calls 45834->45835 45837 40d43c 45835->45837 45838 401fc2 28 API calls 45836->45838 45847 40e563 45837->45847 45840 419e21 45838->45840 45839 401fc2 28 API calls 45839->45846 45841 401fb8 11 API calls 45840->45841 45843 419e29 45841->45843 45842 401fb8 11 API calls 45842->45846 45844 41ab9a 28 API calls 45843->45844 45844->45827 45846->45827 45846->45830 45846->45839 45846->45842 46196 404182 45846->46196 46199 41ab9a 45846->46199 45848 40e56f 45847->45848 45850 40e576 45847->45850 46241 402143 11 API calls 45848->46241 45850->45545 45852 401e4d 45851->45852 45853 401e55 45852->45853 46242 402138 22 API calls 45852->46242 45853->45552 45857 4020bf 11 API calls 45856->45857 45858 40530a 45857->45858 46243 403280 45858->46243 45860 405326 45860->45560 46248 4051cf 45861->46248 45863 408217 46252 402035 45863->46252 45866 401fc2 45867 401fd1 45866->45867 45874 402019 45866->45874 45868 4023ae 11 API calls 45867->45868 45869 401fda 45868->45869 45870 40201c 45869->45870 45872 401ff5 45869->45872 45871 40265a 11 API calls 45870->45871 45871->45874 46286 403078 28 API calls 45872->46286 45874->45570 45876 401fb2 45875->45876 45877 401fa9 45875->45877 45876->45579 46287 4025c0 28 API calls 45877->46287 46288 419f23 45879->46288 45884 401fc2 28 API calls 45885 4192ea 45884->45885 45886 401fb8 11 API calls 45885->45886 45887 4192f2 45886->45887 45888 411f91 31 API calls 45887->45888 45889 419348 45887->45889 45890 41931b 45888->45890 45889->45608 45891 419326 StrToIntA 45890->45891 45892 41933d 45891->45892 45893 419334 45891->45893 45895 401fb8 11 API calls 45892->45895 46296 41accf 22 API calls 45893->46296 45895->45889 45897 412356 45896->45897 45898 4062ee 28 API calls 45897->45898 45899 41236b 45898->45899 45900 4020d6 28 API calls 45899->45900 45901 41237b 45900->45901 45902 41215f 14 API calls 45901->45902 45903 412385 45902->45903 45904 401fb8 11 API calls 45903->45904 45905 412392 45904->45905 45905->45710 45907 40207b 45906->45907 45908 4023ae 11 API calls 45907->45908 45909 402086 45908->45909 46297 4024cd 45909->46297 45913 4121af 45912->45913 45915 412178 45912->45915 45914 401fb8 11 API calls 45913->45914 45916 40da38 45914->45916 45917 41218a RegSetValueExA RegCloseKey 45915->45917 45916->45659 45917->45913 45919 439880 _swprintf 45918->45919 46301 438bbe 45919->46301 45921 40da51 45921->45667 45921->45668 45923 4194f0 GetLocalTime 45922->45923 45924 41958b 45922->45924 45925 4052fe 28 API calls 45923->45925 45926 401fb8 11 API calls 45924->45926 45928 419532 45925->45928 45927 419593 45926->45927 45929 401fb8 11 API calls 45927->45929 45930 408209 28 API calls 45928->45930 45931 40daa1 45929->45931 45932 41953e 45930->45932 45931->45684 46329 402ef0 45932->46329 45935 408209 28 API calls 45936 419556 45935->45936 46334 41928b 76 API calls 45936->46334 45938 419564 45939 401fb8 11 API calls 45938->45939 45940 419570 45939->45940 45941 401fb8 11 API calls 45940->45941 45942 419579 45941->45942 45943 401fb8 11 API calls 45942->45943 45944 419582 45943->45944 45945 401fb8 11 API calls 45944->45945 45945->45924 46338 401f66 45946->46338 45948 408f36 _wcslen 45949 408f60 45948->45949 45950 408f49 45948->45950 45952 40c5ed 31 API calls 45949->45952 45951 40c5ed 31 API calls 45950->45951 45953 408f51 45951->45953 45954 408f68 45952->45954 45955 401ef3 28 API calls 45953->45955 45956 401ef3 28 API calls 45954->45956 45982 408f5b 45955->45982 45957 408f76 45956->45957 45958 401ee9 11 API calls 45957->45958 45960 408f7e 45958->45960 45959 401ee9 11 API calls 45961 408fb5 45959->45961 46370 4081c7 28 API calls 45960->46370 45963 408ffb 45961->45963 45964 408fdc 45961->45964 46342 408098 45963->46342 45966 408fe1 45964->45966 45967 409013 45964->45967 45965 408f90 46371 402ff4 45965->46371 45973 408098 28 API calls 45966->45973 45972 401ee9 11 API calls 45967->45972 45976 40901b 45972->45976 45977 408fef 45973->45977 45975 401ef3 28 API calls 45978 408fa5 45975->45978 45976->45727 46376 4092ba 29 API calls 45977->46376 45980 401ee9 11 API calls 45978->45980 45980->45982 45981 408ff9 45981->45967 45982->45959 46572 40415e 45983->46572 45988 402ff4 28 API calls 45989 41965d 45988->45989 45990 401ee9 11 API calls 45989->45990 45991 419666 45990->45991 45992 401ee9 11 API calls 45991->45992 45993 40dca2 45992->45993 45994 401ef3 45993->45994 45995 401f02 45994->45995 46002 401f4a 45994->46002 45996 402232 11 API calls 45995->45996 45997 401f0b 45996->45997 45998 401f4d 45997->45998 46000 401f26 45997->46000 45999 402316 11 API calls 45998->45999 45999->46002 46668 40303c 28 API calls 46000->46668 46003 401ee9 46002->46003 46004 402232 11 API calls 46003->46004 46005 401ef2 46004->46005 46005->45771 46005->45772 46669 40533f 28 API calls 46006->46669 46009 4020bf 11 API calls 46008->46009 46010 413994 46009->46010 46670 419894 46010->46670 46013 4020bf 11 API calls 46014 4139aa 46013->46014 46015 401e45 22 API calls 46014->46015 46016 4139b8 46015->46016 46017 439867 39 API calls 46016->46017 46018 4139c5 46017->46018 46019 4139d7 46018->46019 46020 4139ca Sleep 46018->46020 46021 402073 28 API calls 46019->46021 46020->46019 46022 4139e6 46021->46022 46023 401e45 22 API calls 46022->46023 46024 4139ef 46023->46024 46025 4020d6 28 API calls 46024->46025 46026 4139fa 46025->46026 46027 419d87 28 API calls 46026->46027 46028 413a02 46027->46028 46674 40487e WSAStartup 46028->46674 46030 413a0c 46031 401e45 22 API calls 46030->46031 46032 413a15 46031->46032 46033 401e45 22 API calls 46032->46033 46079 413a94 46032->46079 46034 413a2e 46033->46034 46035 401e45 22 API calls 46034->46035 46036 413a3f 46035->46036 46038 401e45 22 API calls 46036->46038 46037 419d87 28 API calls 46037->46079 46039 413a50 46038->46039 46041 401e45 22 API calls 46039->46041 46040 40822a 28 API calls 46040->46079 46042 413a61 46041->46042 46044 401e45 22 API calls 46042->46044 46043 401fc2 28 API calls 46043->46079 46045 413a72 46044->46045 46046 401e45 22 API calls 46045->46046 46047 413a84 46046->46047 46803 40471d 88 API calls 46047->46803 46049 402073 28 API calls 46049->46079 46050 4194da 79 API calls 46050->46079 46052 413be2 WSAGetLastError 46804 41a86b 30 API calls 46052->46804 46055 4052dd 28 API calls 46057 413bf2 46055->46057 46057->46055 46062 401e6d 11 API calls 46057->46062 46063 401e45 22 API calls 46057->46063 46065 439867 39 API calls 46057->46065 46057->46079 46099 402073 28 API calls 46057->46099 46100 4194da 79 API calls 46057->46100 46101 414461 CreateThread 46057->46101 46102 401fb8 11 API calls 46057->46102 46103 401ee9 11 API calls 46057->46103 46806 409f9a 84 API calls 46057->46806 46807 404e06 98 API calls 46057->46807 46060 401e45 22 API calls 46060->46079 46061 4052fe 28 API calls 46061->46079 46062->46057 46063->46057 46064 402ef0 28 API calls 46064->46079 46067 4144bf Sleep 46065->46067 46066 408209 28 API calls 46066->46079 46067->46057 46068 401fb8 11 API calls 46068->46079 46071 408098 28 API calls 46071->46079 46072 43f34f 20 API calls 46072->46079 46073 4020d6 28 API calls 46073->46079 46074 4120e8 3 API calls 46074->46079 46075 411f91 31 API calls 46075->46079 46076 40415e 28 API calls 46076->46079 46078 419b16 28 API calls 46078->46079 46079->46037 46079->46040 46079->46043 46079->46049 46079->46050 46079->46052 46079->46057 46079->46060 46079->46061 46079->46064 46079->46066 46079->46068 46079->46071 46079->46072 46079->46073 46079->46074 46079->46075 46079->46076 46079->46078 46080 401e45 22 API calls 46079->46080 46675 41393f 46079->46675 46680 40480d 46079->46680 46687 404f31 46079->46687 46702 4048a8 connect 46079->46702 46762 4197c1 46079->46762 46765 413013 46079->46765 46768 419c8a 46079->46768 46081 413e7b GetTickCount 46080->46081 46082 419b16 28 API calls 46081->46082 46095 413e98 46082->46095 46084 419b16 28 API calls 46084->46095 46087 419c8a 28 API calls 46087->46095 46089 402e81 28 API calls 46089->46095 46090 408209 28 API calls 46090->46095 46092 402ef0 28 API calls 46092->46095 46094 401fb8 11 API calls 46094->46095 46095->46084 46095->46087 46095->46089 46095->46090 46095->46092 46095->46094 46096 401ee9 11 API calls 46095->46096 46772 419ac6 46095->46772 46774 419a77 46095->46774 46779 40e2bb GetLocaleInfoA 46095->46779 46782 402f11 28 API calls 46095->46782 46783 40826c 28 API calls 46095->46783 46784 404bf0 46095->46784 46805 404a81 60 API calls _Yarn 46095->46805 46096->46095 46099->46057 46100->46057 46101->46057 46102->46057 46103->46057 46104->45553 46105->45561 46106->45565 46109 4020bf 11 API calls 46108->46109 46110 408236 46109->46110 46111 403280 28 API calls 46110->46111 46112 408253 46111->46112 46112->45587 46114 411f5e RegQueryValueExA RegCloseKey 46113->46114 46115 40d5c5 46113->46115 46114->46115 46115->45584 46115->45607 46116->45590 46117->45609 46118->45635 46119->45609 46120->45620 46122 401f66 11 API calls 46121->46122 46123 40c609 46122->46123 46124 40c629 46123->46124 46125 40c65e 46123->46125 46129 40c61f 46123->46129 47150 41959f 29 API calls 46124->47150 46128 419f23 GetCurrentProcess 46125->46128 46127 40c752 GetLongPathNameW 46131 40415e 28 API calls 46127->46131 46132 40c663 46128->46132 46129->46127 46130 40c632 46133 401ef3 28 API calls 46130->46133 46134 40c767 46131->46134 46135 40c667 46132->46135 46136 40c6b9 46132->46136 46174 40c63c 46133->46174 46137 40415e 28 API calls 46134->46137 46139 40415e 28 API calls 46135->46139 46138 40415e 28 API calls 46136->46138 46140 40c776 46137->46140 46143 40c6c7 46138->46143 46144 40c675 46139->46144 47153 40c7f9 28 API calls 46140->47153 46141 401ee9 11 API calls 46141->46129 46146 40415e 28 API calls 46143->46146 46147 40415e 28 API calls 46144->46147 46145 40c789 47154 402f85 28 API calls 46145->47154 46150 40c6dd 46146->46150 46151 40c68b 46147->46151 46149 40c794 47155 402f85 28 API calls 46149->47155 47152 402f85 28 API calls 46150->47152 47151 402f85 28 API calls 46151->47151 46155 40c79e 46158 401ee9 11 API calls 46155->46158 46156 40c6e8 46159 401ef3 28 API calls 46156->46159 46157 40c696 46160 401ef3 28 API calls 46157->46160 46161 40c7a8 46158->46161 46162 40c6f3 46159->46162 46163 40c6a1 46160->46163 46164 401ee9 11 API calls 46161->46164 46165 401ee9 11 API calls 46162->46165 46166 401ee9 11 API calls 46163->46166 46167 40c7b1 46164->46167 46168 40c6fc 46165->46168 46169 40c6aa 46166->46169 46170 401ee9 11 API calls 46167->46170 46171 401ee9 11 API calls 46168->46171 46172 401ee9 11 API calls 46169->46172 46173 40c7ba 46170->46173 46171->46174 46172->46174 46175 401ee9 11 API calls 46173->46175 46174->46141 46176 40c7c3 46175->46176 46177 401ee9 11 API calls 46176->46177 46178 40c7cc 46177->46178 46178->45699 46179->45709 46180->45724 46181->45728 46183 41210e RegQueryValueExA RegCloseKey 46182->46183 46184 412132 46182->46184 46183->46184 46184->45641 46185->45673 46186->45767 46187->45755 46188->45614 46191 4194b0 LoadResource LockResource SizeofResource 46190->46191 46192 40dd9e 46190->46192 46191->46192 46192->45813 46194 402097 28 API calls 46193->46194 46195 406302 46194->46195 46195->45824 46210 40421a 46196->46210 46200 41aba7 46199->46200 46201 41abb7 46200->46201 46203 41ac06 46200->46203 46206 41abef 46201->46206 46216 41ad46 46201->46216 46202 41ac20 46225 41aec3 28 API calls 46202->46225 46203->46202 46204 41ad46 28 API calls 46203->46204 46204->46202 46224 41aec3 28 API calls 46206->46224 46207 41ac02 46207->45846 46211 404223 46210->46211 46212 4023ae 11 API calls 46211->46212 46213 40422e 46212->46213 46214 402549 28 API calls 46213->46214 46215 404195 46214->46215 46215->45846 46218 41ad4e 46216->46218 46217 41ad80 46217->46206 46218->46217 46219 41ad84 46218->46219 46222 41ad68 46218->46222 46236 402705 22 API calls 46219->46236 46226 41adb7 46222->46226 46224->46207 46225->46207 46227 41adc1 __EH_prolog 46226->46227 46237 4026f7 22 API calls 46227->46237 46229 41add4 46238 41aeda 11 API calls 46229->46238 46231 41ae32 46231->46217 46232 41adfa 46232->46231 46239 402710 11 API calls 46232->46239 46234 41ae19 46240 4026f2 11 API calls std::_Deallocate 46234->46240 46237->46229 46238->46232 46239->46234 46240->46231 46241->45850 46245 40328a 46243->46245 46244 4032a9 46244->45860 46245->46244 46247 4028c8 28 API calls 46245->46247 46247->46244 46249 4051db 46248->46249 46258 405254 46249->46258 46251 4051e8 46251->45863 46253 402041 46252->46253 46254 4023ae 11 API calls 46253->46254 46255 40205b 46254->46255 46282 40265a 46255->46282 46259 405262 46258->46259 46260 405268 46259->46260 46261 40527e 46259->46261 46269 4025d0 46260->46269 46262 4052d5 46261->46262 46263 405296 46261->46263 46279 402884 22 API calls 46262->46279 46268 40527c 46263->46268 46278 4028c8 28 API calls 46263->46278 46268->46251 46270 402868 22 API calls 46269->46270 46271 4025e2 46270->46271 46272 402652 46271->46272 46273 402609 46271->46273 46281 402884 22 API calls 46272->46281 46277 40261b 46273->46277 46280 4028c8 28 API calls 46273->46280 46277->46268 46278->46268 46280->46277 46283 40266b 46282->46283 46284 4023ae 11 API calls 46283->46284 46285 40206d 46284->46285 46285->45866 46286->45874 46287->45876 46289 419f30 GetCurrentProcess 46288->46289 46290 4192bc 46288->46290 46289->46290 46291 411f91 RegOpenKeyExA 46290->46291 46292 411fbf RegQueryValueExA RegCloseKey 46291->46292 46293 411fe9 46291->46293 46292->46293 46294 402073 28 API calls 46293->46294 46295 411ffe 46294->46295 46295->45884 46296->45892 46298 4024d9 46297->46298 46299 4024ea 28 API calls 46298->46299 46300 402091 46299->46300 46300->45654 46317 4397c5 46301->46317 46303 438c0b 46323 438557 35 API calls 3 library calls 46303->46323 46304 438bd0 46304->46303 46305 438be5 46304->46305 46316 438bea __cftof 46304->46316 46322 43ad91 20 API calls __dosmaperr 46305->46322 46309 438c17 46310 438c46 46309->46310 46324 43980a 39 API calls __Toupper 46309->46324 46313 438cb2 46310->46313 46325 439771 20 API calls 2 library calls 46310->46325 46326 439771 20 API calls 2 library calls 46313->46326 46314 438d79 _swprintf 46314->46316 46327 43ad91 20 API calls __dosmaperr 46314->46327 46316->45921 46318 4397ca 46317->46318 46319 4397dd 46317->46319 46328 43ad91 20 API calls __dosmaperr 46318->46328 46319->46304 46321 4397cf __cftof 46321->46304 46322->46316 46323->46309 46324->46309 46325->46313 46326->46314 46327->46316 46328->46321 46335 401f90 46329->46335 46331 402efe 46332 402035 11 API calls 46331->46332 46333 402f0d 46332->46333 46333->45935 46334->45938 46336 4025d0 28 API calls 46335->46336 46337 401f9d 46336->46337 46337->46331 46339 401f6e 46338->46339 46377 402232 46339->46377 46341 401f79 46341->45948 46343 4080ae 46342->46343 46344 402232 11 API calls 46343->46344 46345 4080c8 46344->46345 46382 404247 46345->46382 46347 4080d6 46348 409203 46347->46348 46395 40a83c 46348->46395 46351 409257 46354 402073 28 API calls 46351->46354 46352 40922f 46353 402073 28 API calls 46352->46353 46355 409239 46353->46355 46356 409262 46354->46356 46399 419bca 28 API calls 46355->46399 46358 402073 28 API calls 46356->46358 46360 409271 46358->46360 46359 409247 46400 40a0b0 31 API calls _Yarn 46359->46400 46362 4194da 79 API calls 46360->46362 46364 409276 CreateThread 46362->46364 46363 40924e 46365 401fb8 11 API calls 46363->46365 46366 409291 CreateThread 46364->46366 46367 40929d CreateThread 46364->46367 46408 409305 46364->46408 46365->46351 46366->46367 46405 4092ef 46366->46405 46368 401ee9 11 API calls 46367->46368 46402 409311 46367->46402 46369 4092b1 46368->46369 46369->45967 46370->45965 46543 403202 46371->46543 46373 403002 46547 403242 46373->46547 46376->45981 46571 4092fb 162 API calls 46376->46571 46378 40228c 46377->46378 46379 40223c 46377->46379 46378->46341 46379->46378 46381 402759 11 API calls std::_Deallocate 46379->46381 46381->46378 46383 402868 22 API calls 46382->46383 46384 40425b 46383->46384 46385 404270 46384->46385 46386 404285 46384->46386 46392 4042bf 22 API calls 46385->46392 46394 4027c6 28 API calls 46386->46394 46389 404279 46393 402c28 22 API calls 46389->46393 46391 404283 46391->46347 46392->46389 46393->46391 46394->46391 46396 40a845 46395->46396 46397 409221 46395->46397 46401 40a8bc 28 API calls 46396->46401 46397->46351 46397->46352 46399->46359 46400->46363 46401->46397 46411 409c1f 46402->46411 46465 409340 46405->46465 46485 40971e 46408->46485 46421 409c2d 46411->46421 46412 40931a 46413 409c87 Sleep GetForegroundWindow GetWindowTextLengthW 46441 40a854 46413->46441 46417 401f66 11 API calls 46417->46421 46418 419ac6 GetTickCount 46418->46421 46420 409ccd GetWindowTextW 46420->46421 46421->46412 46421->46413 46421->46417 46421->46418 46421->46420 46423 401ee9 11 API calls 46421->46423 46424 409e25 46421->46424 46425 40a83c 28 API calls 46421->46425 46427 409d92 Sleep 46421->46427 46430 402073 28 API calls 46421->46430 46431 409d1a 46421->46431 46432 4052dd 28 API calls 46421->46432 46435 408209 28 API calls 46421->46435 46437 402ff4 28 API calls 46421->46437 46439 40962e 12 API calls 46421->46439 46440 401fb8 11 API calls 46421->46440 46447 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 46421->46447 46448 432525 23 API calls __onexit 46421->46448 46449 43215c SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 46421->46449 46450 408080 28 API calls 46421->46450 46452 40a8cc 28 API calls 46421->46452 46453 40a694 40 API calls 2 library calls 46421->46453 46454 43f34f 46421->46454 46458 419bca 28 API calls 46421->46458 46423->46421 46426 401ee9 11 API calls 46424->46426 46425->46421 46426->46412 46427->46421 46430->46421 46431->46421 46433 408098 28 API calls 46431->46433 46451 40a0b0 31 API calls _Yarn 46431->46451 46432->46421 46433->46431 46435->46421 46437->46421 46439->46421 46440->46421 46442 40a85c 46441->46442 46443 402232 11 API calls 46442->46443 46444 40a867 46443->46444 46459 40a87c 28 API calls 46444->46459 46446 40a876 46446->46421 46448->46421 46449->46421 46450->46421 46451->46431 46452->46421 46453->46421 46455 43f35b 46454->46455 46460 43f14b 46455->46460 46457 43f37c 46457->46421 46458->46421 46459->46446 46461 43f162 46460->46461 46463 43f199 __cftof 46461->46463 46464 43ad91 20 API calls __dosmaperr 46461->46464 46463->46457 46464->46463 46466 409359 GetModuleHandleA SetWindowsHookExA 46465->46466 46467 4093bb GetMessageA 46465->46467 46466->46467 46469 409375 GetLastError 46466->46469 46468 4093cd TranslateMessage DispatchMessageA 46467->46468 46470 4092f8 46467->46470 46468->46467 46468->46470 46480 419b16 46469->46480 46473 4052dd 28 API calls 46474 409396 46473->46474 46475 402073 28 API calls 46474->46475 46476 4093a5 46475->46476 46477 4194da 79 API calls 46476->46477 46478 4093aa 46477->46478 46479 401fb8 11 API calls 46478->46479 46479->46470 46481 43f34f 20 API calls 46480->46481 46482 419b3a 46481->46482 46483 402073 28 API calls 46482->46483 46484 409386 46483->46484 46484->46473 46486 409733 Sleep 46485->46486 46505 40966d 46486->46505 46488 40930e 46489 409773 CreateDirectoryW 46491 409745 46489->46491 46490 409784 GetFileAttributesW 46490->46491 46491->46486 46491->46488 46491->46489 46491->46490 46492 40979b SetFileAttributesW 46491->46492 46493 4020bf 11 API calls 46491->46493 46495 409815 PathFileExistsW 46491->46495 46496 401e45 22 API calls 46491->46496 46497 409915 46491->46497 46499 402097 28 API calls 46491->46499 46501 401fb8 11 API calls 46491->46501 46502 401fc2 28 API calls 46491->46502 46503 4062ee 28 API calls 46491->46503 46518 41a17b 46491->46518 46528 41a20f CreateFileW 46491->46528 46536 41a27c CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 46491->46536 46492->46491 46493->46491 46495->46491 46496->46491 46500 40991e SetFileAttributesW 46497->46500 46499->46491 46500->46491 46501->46491 46502->46491 46503->46491 46506 40971a 46505->46506 46509 409683 46505->46509 46506->46491 46507 4096a2 CreateFileW 46508 4096b0 GetFileSize 46507->46508 46507->46509 46508->46509 46510 4096e5 CloseHandle 46508->46510 46509->46507 46509->46510 46511 4096f7 46509->46511 46512 4096d3 46509->46512 46513 4096da Sleep 46509->46513 46510->46509 46511->46506 46515 408098 28 API calls 46511->46515 46537 40a025 83 API calls 46512->46537 46513->46510 46516 409713 46515->46516 46517 409203 123 API calls 46516->46517 46517->46506 46519 41a18e CreateFileW 46518->46519 46521 41a1c7 46519->46521 46522 41a1cb 46519->46522 46521->46491 46523 41a1d2 SetFilePointer 46522->46523 46524 41a1eb WriteFile 46522->46524 46523->46524 46525 41a1e2 CloseHandle 46523->46525 46526 41a200 CloseHandle 46524->46526 46527 41a1fe 46524->46527 46525->46521 46526->46521 46527->46526 46529 41a235 46528->46529 46530 41a239 GetFileSize 46528->46530 46529->46491 46538 40242e 46530->46538 46532 41a24d 46533 41a25f ReadFile 46532->46533 46534 41a26c 46533->46534 46535 41a26e CloseHandle 46533->46535 46534->46535 46535->46529 46536->46491 46537->46513 46539 402436 46538->46539 46540 402440 46539->46540 46542 402a31 28 API calls 46539->46542 46540->46532 46542->46540 46544 40320e 46543->46544 46553 4035f8 46544->46553 46546 40321b 46546->46373 46548 40324e 46547->46548 46549 402232 11 API calls 46548->46549 46550 403268 46549->46550 46567 402316 46550->46567 46554 403606 46553->46554 46555 403624 46554->46555 46556 40360c 46554->46556 46558 40363c 46555->46558 46559 40367e 46555->46559 46564 403686 28 API calls 46556->46564 46563 403622 46558->46563 46565 4027c6 28 API calls 46558->46565 46566 402884 22 API calls 46559->46566 46563->46546 46564->46563 46565->46563 46568 402327 46567->46568 46569 402232 11 API calls 46568->46569 46570 4023a7 46569->46570 46570->45975 46573 404166 46572->46573 46574 402232 11 API calls 46573->46574 46575 404171 46574->46575 46583 40419c 46575->46583 46578 4042dc 46595 404333 46578->46595 46580 4042ea 46581 403242 11 API calls 46580->46581 46582 4042f9 46581->46582 46582->45988 46584 4041a8 46583->46584 46587 4041b9 46584->46587 46586 40417c 46586->46578 46588 4041c9 46587->46588 46589 4041e6 46588->46589 46590 4041cf 46588->46590 46594 4027c6 28 API calls 46589->46594 46592 404247 28 API calls 46590->46592 46593 4041e4 46592->46593 46593->46586 46594->46593 46596 40433f 46595->46596 46599 404351 46596->46599 46598 40434d 46598->46580 46600 40435f 46599->46600 46601 404365 46600->46601 46602 40437e 46600->46602 46665 4034c6 28 API calls 46601->46665 46603 402868 22 API calls 46602->46603 46604 404386 46603->46604 46606 4043f9 46604->46606 46607 40439f 46604->46607 46667 402884 22 API calls 46606->46667 46618 40437c 46607->46618 46666 4027c6 28 API calls 46607->46666 46618->46598 46665->46618 46666->46618 46668->46002 46673 4198da _Yarn ___scrt_get_show_window_mode 46670->46673 46671 402073 28 API calls 46672 41399f 46671->46672 46672->46013 46673->46671 46674->46030 46676 413958 getaddrinfo WSASetLastError 46675->46676 46677 41394e 46675->46677 46676->46079 46808 4137dc 29 API calls ___std_exception_copy 46677->46808 46679 413953 46679->46676 46681 404826 socket 46680->46681 46682 404819 46680->46682 46684 404840 CreateEventW 46681->46684 46685 404822 46681->46685 46809 40487e WSAStartup 46682->46809 46684->46079 46685->46079 46686 40481e 46686->46681 46686->46685 46688 404f45 46687->46688 46689 404fca 46687->46689 46690 404f4e 46688->46690 46691 404fa0 CreateEventA CreateThread 46688->46691 46692 404f5d GetLocalTime 46688->46692 46689->46079 46690->46691 46691->46689 46810 405130 46691->46810 46693 419b16 28 API calls 46692->46693 46694 404f71 46693->46694 46695 4052dd 28 API calls 46694->46695 46696 404f81 46695->46696 46697 402073 28 API calls 46696->46697 46698 404f90 46697->46698 46699 4194da 79 API calls 46698->46699 46700 404f95 46699->46700 46701 401fb8 11 API calls 46700->46701 46701->46691 46703 4049fb 46702->46703 46704 4048ce 46702->46704 46705 40495e 46703->46705 46706 404a01 WSAGetLastError 46703->46706 46704->46705 46709 4052fe 28 API calls 46704->46709 46725 404903 46704->46725 46705->46079 46706->46705 46707 404a11 46706->46707 46710 404912 46707->46710 46711 404a16 46707->46711 46713 4048ef 46709->46713 46715 402073 28 API calls 46710->46715 46819 41a86b 30 API calls 46711->46819 46712 40490b 46712->46710 46719 404921 46712->46719 46716 402073 28 API calls 46713->46716 46720 404a60 46715->46720 46721 4048fe 46716->46721 46717 404a20 46718 4052dd 28 API calls 46717->46718 46722 404a30 46718->46722 46727 404930 46719->46727 46728 404967 46719->46728 46723 402073 28 API calls 46720->46723 46724 4194da 79 API calls 46721->46724 46726 402073 28 API calls 46722->46726 46729 404a6f 46723->46729 46724->46725 46814 41ea15 27 API calls 46725->46814 46730 404a3f 46726->46730 46732 402073 28 API calls 46727->46732 46816 41f7f5 53 API calls 46728->46816 46733 4194da 79 API calls 46729->46733 46734 4194da 79 API calls 46730->46734 46736 40493f 46732->46736 46733->46705 46737 404a44 46734->46737 46735 40496f 46738 4049a4 46735->46738 46739 404974 46735->46739 46740 402073 28 API calls 46736->46740 46741 401fb8 11 API calls 46737->46741 46818 41ebbb 28 API calls 46738->46818 46742 402073 28 API calls 46739->46742 46743 40494e 46740->46743 46741->46705 46746 404983 46742->46746 46747 4194da 79 API calls 46743->46747 46745 4049ac 46748 4049d9 CreateEventW CreateEventW 46745->46748 46751 402073 28 API calls 46745->46751 46749 402073 28 API calls 46746->46749 46750 404953 46747->46750 46748->46705 46752 404992 46749->46752 46815 41c4c6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 46750->46815 46754 4049c2 46751->46754 46755 4194da 79 API calls 46752->46755 46756 402073 28 API calls 46754->46756 46757 404997 46755->46757 46758 4049d1 46756->46758 46817 41ee67 51 API calls 46757->46817 46760 4194da 79 API calls 46758->46760 46761 4049d6 46760->46761 46761->46748 46820 419797 GlobalMemoryStatusEx 46762->46820 46764 4197d6 46764->46079 46821 412fd6 46765->46821 46769 419c97 46768->46769 46770 402097 28 API calls 46769->46770 46771 419ca9 46770->46771 46771->46079 46773 419adc GetTickCount 46772->46773 46773->46095 46775 434c30 ___scrt_get_show_window_mode 46774->46775 46776 419a98 GetForegroundWindow GetWindowTextW 46775->46776 46777 40415e 28 API calls 46776->46777 46778 419abe 46777->46778 46778->46095 46780 402073 28 API calls 46779->46780 46781 40e2e0 46780->46781 46781->46095 46782->46095 46783->46095 46785 4020bf 11 API calls 46784->46785 46786 404c07 46785->46786 46787 4020bf 11 API calls 46786->46787 46798 404c10 46787->46798 46788 439adb _Yarn 21 API calls 46788->46798 46790 404c76 46792 404c81 46790->46792 46790->46798 46791 402097 28 API calls 46791->46798 46872 404e06 98 API calls 46792->46872 46793 401fc2 28 API calls 46793->46798 46795 404c88 46797 401fb8 11 API calls 46795->46797 46796 401fb8 11 API calls 46796->46798 46799 404c91 46797->46799 46798->46788 46798->46790 46798->46791 46798->46793 46798->46796 46859 404ca3 46798->46859 46871 404b76 56 API calls 46798->46871 46800 401fb8 11 API calls 46799->46800 46801 404c9a 46800->46801 46801->46057 46803->46079 46804->46057 46805->46095 46806->46057 46807->46057 46808->46679 46809->46686 46813 40513c 101 API calls 46810->46813 46812 405139 46813->46812 46814->46712 46815->46705 46816->46735 46817->46750 46818->46745 46819->46717 46820->46764 46824 412fa9 46821->46824 46825 412fbe ___scrt_initialize_default_local_stdio_options 46824->46825 46828 43eea0 46825->46828 46831 43c3e3 46828->46831 46832 43c423 46831->46832 46833 43c40b 46831->46833 46832->46833 46834 43c42b 46832->46834 46853 43ad91 20 API calls __dosmaperr 46833->46853 46854 438557 35 API calls 3 library calls 46834->46854 46837 43c43b 46855 43cb38 20 API calls 2 library calls 46837->46855 46838 43c410 __cftof 46846 432d4b 46838->46846 46841 412fcc 46841->46079 46842 43c4b3 46856 43d0e9 50 API calls 3 library calls 46842->46856 46845 43c4be 46857 43cba2 20 API calls _free 46845->46857 46847 432d56 IsProcessorFeaturePresent 46846->46847 46848 432d54 46846->46848 46850 432d98 46847->46850 46848->46841 46858 432d5c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 46850->46858 46852 432e7b 46852->46841 46853->46838 46854->46837 46855->46842 46856->46845 46857->46838 46858->46852 46860 4020bf 11 API calls 46859->46860 46869 404cbe 46860->46869 46861 404df3 46862 401fb8 11 API calls 46861->46862 46863 404dfc 46862->46863 46863->46790 46864 404182 28 API calls 46864->46869 46865 401fc2 28 API calls 46865->46869 46866 4020d6 28 API calls 46866->46869 46867 401fa0 28 API calls 46868 404d8d CreateEventA CreateThread WaitForSingleObject CloseHandle 46867->46868 46868->46869 46873 4144da 46868->46873 46869->46861 46869->46864 46869->46865 46869->46866 46869->46867 46870 401fb8 11 API calls 46869->46870 46870->46869 46871->46798 46872->46795 46874 4020d6 28 API calls 46873->46874 46875 4144f9 SetEvent 46874->46875 46876 41450e 46875->46876 46877 404182 28 API calls 46876->46877 46878 414528 46877->46878 46879 4020d6 28 API calls 46878->46879 46880 414538 46879->46880 46881 4020d6 28 API calls 46880->46881 46882 41454a 46881->46882 46883 419d87 28 API calls 46882->46883 46884 414553 46883->46884 46885 415281 46884->46885 46886 414563 46884->46886 46889 4152c1 46885->46889 46890 4152e6 46885->46890 46891 4154e6 46885->46891 46892 415506 46885->46892 46893 4153ca 46885->46893 46894 4155ad 46885->46894 46895 41548f 46885->46895 46896 41558f 46885->46896 46897 415510 46885->46897 46898 415412 46885->46898 46899 415432 46885->46899 46900 415452 46885->46900 46901 4155f5 46885->46901 46902 415599 46885->46902 46903 41555d 46885->46903 46904 41535f 46885->46904 46905 41529e 46885->46905 46995 4152b9 46885->46995 46887 414569 46886->46887 46888 415188 46886->46888 46921 41457c GetTickCount 46887->46921 46887->46995 47117 4146de 46887->47117 47125 4157e1 14 API calls 46888->47125 46918 401e45 22 API calls 46889->46918 46924 401e45 22 API calls 46890->46924 46925 401e45 22 API calls 46891->46925 47140 418e33 215 API calls 46892->47140 46909 401e45 22 API calls 46893->46909 47145 4066a6 58 API calls 46894->47145 46913 401e45 22 API calls 46895->46913 47143 418ccd 104 API calls 46896->47143 46910 415519 46897->46910 46911 41553e ShowWindow SetForegroundWindow 46897->46911 46919 401e45 22 API calls 46898->46919 46923 401e45 22 API calls 46899->46923 46928 401e45 22 API calls 46900->46928 47146 405b0b 48 API calls 46901->47146 47144 418dec 60 API calls 46902->47144 46915 401e45 22 API calls 46903->46915 47133 407ba0 14 API calls 46904->47133 46914 401e45 22 API calls 46905->46914 46906 401e6d 11 API calls 46916 41565d 46906->46916 46934 4153e5 46909->46934 47141 41aa4f 81 API calls ___scrt_get_show_window_mode 46910->47141 46911->46995 46930 41549b 46913->46930 46936 4152a9 46914->46936 46937 41556a 46915->46937 46931 401fb8 11 API calls 46916->46931 46938 4152cc 46918->46938 46939 41541d 46919->46939 46940 419b16 28 API calls 46921->46940 46941 41543d 46923->46941 46942 4152f1 46924->46942 46933 4154f1 46925->46933 46927 415194 46944 401e45 22 API calls 46927->46944 46945 41545f 46928->46945 46929 4155fe 46947 401e45 22 API calls 46929->46947 46971 4154b0 46930->46971 46972 4154c7 46930->46972 46949 415669 46931->46949 46932 41536b 46950 401e45 22 API calls 46932->46950 46955 4020d6 28 API calls 46933->46955 46969 401e45 22 API calls 46934->46969 46948 4020d6 28 API calls 46936->46948 46975 401e45 22 API calls 46937->46975 46977 439867 39 API calls 46938->46977 46951 4020d6 28 API calls 46939->46951 46952 41458d 46940->46952 46954 4020d6 28 API calls 46941->46954 46966 4152f8 StrToIntA 46942->46966 46943 4155b2 46956 401e45 22 API calls 46943->46956 46957 41519f 46944->46957 46968 402073 28 API calls 46945->46968 46946 415520 CreateThread 46946->46995 47149 41b212 10 API calls 46946->47149 46958 415609 46947->46958 46962 4152b4 46948->46962 46959 401fb8 11 API calls 46949->46959 46960 415376 46950->46960 46963 415428 46951->46963 46964 419ac6 GetTickCount 46952->46964 46965 415448 46954->46965 46961 4154fc 46955->46961 46967 4155bf 46956->46967 46985 439867 39 API calls 46957->46985 46970 401e45 22 API calls 46958->46970 46974 415675 46959->46974 46976 4020d6 28 API calls 46960->46976 47139 4159ba 125 API calls 46961->47139 46962->46995 47129 406bda 215 API calls 46962->47129 47136 417a63 215 API calls 46963->47136 46979 414599 46964->46979 47137 403f08 215 API calls 46965->47137 46981 401e45 22 API calls 46966->46981 46983 419b16 28 API calls 46967->46983 46986 415471 46968->46986 46992 4153f8 46969->46992 46987 415616 46970->46987 46988 401e45 22 API calls 46971->46988 46990 401e45 22 API calls 46972->46990 46993 415581 46975->46993 46989 415381 46976->46989 46994 4152d9 46977->46994 46996 419b16 28 API calls 46979->46996 46997 41530c 46981->46997 46984 4155d5 46983->46984 46998 402ef0 28 API calls 46984->46998 46999 4151ac 46985->46999 47016 41215f 14 API calls 46986->47016 47147 402f11 28 API calls 46987->47147 47001 4154b5 46988->47001 47003 401e45 22 API calls 46989->47003 47004 4154cc 46990->47004 46991 415501 47017 439867 39 API calls 46992->47017 47142 418dcb 28 API calls 46993->47142 47130 408a88 22 API calls 46994->47130 46995->46906 47006 4145a4 46996->47006 47022 40c5ed 31 API calls 46997->47022 47007 4155e0 46998->47007 47126 415ceb 28 API calls 46999->47126 47010 4020d6 28 API calls 47001->47010 47011 41538c 47003->47011 47012 4020d6 28 API calls 47004->47012 47013 419a77 30 API calls 47006->47013 47014 402ef0 28 API calls 47007->47014 47009 415621 47018 402ef0 28 API calls 47009->47018 47019 4154c0 47010->47019 47020 4020d6 28 API calls 47011->47020 47012->47019 47021 4145b2 47013->47021 47024 4155ea 47014->47024 47015 4151c6 47033 401e45 22 API calls 47015->47033 47016->46995 47027 415405 SetWindowTextW 47017->47027 47025 41562d 47018->47025 47138 4157f2 121 API calls 47019->47138 47026 415397 47020->47026 47028 419c8a 28 API calls 47021->47028 47023 41531f 47022->47023 47037 401e45 22 API calls 47023->47037 47024->46901 47148 405e74 118 API calls 47025->47148 47030 401e45 22 API calls 47026->47030 47027->46898 47032 4145c0 47028->47032 47035 4153a2 47030->47035 47036 401e45 22 API calls 47032->47036 47038 4151d9 47033->47038 47034 415639 47039 401fb8 11 API calls 47034->47039 47040 4020d6 28 API calls 47035->47040 47041 4145ce 47036->47041 47043 415336 47037->47043 47044 4020d6 28 API calls 47038->47044 47045 415642 47039->47045 47046 4153ad 47040->47046 47118 402f11 28 API calls 47041->47118 47131 41a27c CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 47043->47131 47049 4151e4 47044->47049 47050 401fb8 11 API calls 47045->47050 47134 40631d 215 API calls 47046->47134 47047 4145dc 47119 402e81 28 API calls 47047->47119 47054 401e45 22 API calls 47049->47054 47055 41564b 47050->47055 47053 41533f 47132 41a76c 32 API calls 47053->47132 47058 4151ef 47054->47058 47055->46995 47062 401fb8 11 API calls 47055->47062 47056 4153b9 47135 407bae 98 API calls 47056->47135 47057 4145eb 47060 402ef0 28 API calls 47057->47060 47061 4020d6 28 API calls 47058->47061 47063 4145fa 47060->47063 47065 4151fa 47061->47065 47062->46995 47120 402e81 28 API calls 47063->47120 47068 401e45 22 API calls 47065->47068 47067 415351 47070 401ee9 11 API calls 47067->47070 47072 415205 47068->47072 47069 414609 47071 402ef0 28 API calls 47069->47071 47070->46995 47073 414615 47071->47073 47075 40415e 28 API calls 47072->47075 47121 402e81 28 API calls 47073->47121 47077 415217 47075->47077 47076 41461f 47122 404a81 60 API calls _Yarn 47076->47122 47079 401e45 22 API calls 47077->47079 47081 415222 47079->47081 47080 41462e 47082 401fb8 11 API calls 47080->47082 47085 40415e 28 API calls 47081->47085 47083 414637 47082->47083 47084 401fb8 11 API calls 47083->47084 47086 414643 47084->47086 47087 415234 47085->47087 47088 401fb8 11 API calls 47086->47088 47127 40838e 126 API calls 2 library calls 47087->47127 47090 41464f 47088->47090 47091 401fb8 11 API calls 47090->47091 47093 41465b 47091->47093 47094 401fb8 11 API calls 47093->47094 47097 414667 47094->47097 47095 415240 47128 408ae3 98 API calls 47095->47128 47096 4146c2 47096->46995 47098 401fb8 11 API calls 47097->47098 47099 414673 47098->47099 47100 401ee9 11 API calls 47099->47100 47101 41467f 47100->47101 47102 401fb8 11 API calls 47101->47102 47103 414688 47102->47103 47104 401fb8 11 API calls 47103->47104 47105 414691 47104->47105 47106 401e45 22 API calls 47105->47106 47107 41469c 47106->47107 47108 439867 39 API calls 47107->47108 47109 4146a9 47108->47109 47110 4146d4 47109->47110 47111 4146ae 47109->47111 47112 401e45 22 API calls 47110->47112 47113 4146c7 47111->47113 47114 4146bc 47111->47114 47112->47117 47116 404f31 104 API calls 47113->47116 47123 404fd4 81 API calls 47114->47123 47116->47096 47117->46995 47124 4050c4 83 API calls 47117->47124 47118->47047 47119->47057 47120->47069 47121->47076 47122->47080 47123->47096 47124->47096 47125->46927 47126->47015 47127->47095 47128->47096 47129->46995 47130->46995 47131->47053 47132->47067 47133->46932 47134->47056 47135->46995 47138->46995 47139->46991 47140->46995 47141->46946 47142->46995 47143->47096 47144->46995 47145->46943 47146->46929 47147->47009 47148->47034 47150->46130 47151->46157 47152->46156 47153->46145 47154->46149 47155->46155 47158 40e1a8 47156->47158 47157 411f34 3 API calls 47157->47158 47158->47157 47159 40e1da 47158->47159 47160 40e24e 47158->47160 47163 40e23e Sleep 47158->47163 47161 408098 28 API calls 47159->47161 47159->47163 47171 401ee9 11 API calls 47159->47171 47174 402073 28 API calls 47159->47174 47178 41215f 14 API calls 47159->47178 47188 40bc59 111 API calls ___scrt_get_show_window_mode 47159->47188 47189 419bca 28 API calls 47159->47189 47190 412204 14 API calls 47159->47190 47162 408098 28 API calls 47160->47162 47161->47159 47165 40e25b 47162->47165 47163->47158 47191 419bca 28 API calls 47165->47191 47168 40e267 47192 412204 14 API calls 47168->47192 47171->47159 47172 40e27a 47173 401ee9 11 API calls 47172->47173 47175 40e286 47173->47175 47174->47159 47176 402073 28 API calls 47175->47176 47177 40e297 47176->47177 47179 41215f 14 API calls 47177->47179 47178->47159 47180 40e2aa 47179->47180 47193 4112b5 TerminateProcess WaitForSingleObject 47180->47193 47182 40e2b2 ExitProcess 47194 411253 61 API calls 47183->47194 47189->47159 47190->47159 47191->47168 47192->47172 47193->47182

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                                                        • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                                                        • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                                                        • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                                                        • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                                                        • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                                                        • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                                                        • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                                                        • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                                                        • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                                                        • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                                                        • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                                                        • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                                                        • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                                                        • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule$LibraryLoad
                                                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                                                        • API String ID: 551388010-2474455403
                                                                        • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                                                        • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                                                        • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                                                        • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1531 409340-409357 1532 409359-409373 GetModuleHandleA SetWindowsHookExA 1531->1532 1533 4093bb-4093cb GetMessageA 1531->1533 1532->1533 1536 409375-4093b9 GetLastError call 419b16 call 4052dd call 402073 call 4194da call 401fb8 1532->1536 1534 4093e7 1533->1534 1535 4093cd-4093e5 TranslateMessage DispatchMessageA 1533->1535 1537 4093e9-4093ee 1534->1537 1535->1533 1535->1534 1536->1537
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                                                        • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                                                        • GetLastError.KERNEL32 ref: 00409375
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                                                        • TranslateMessage.USER32(?), ref: 004093D2
                                                                        • DispatchMessageA.USER32(?), ref: 004093DD
                                                                        Strings
                                                                        • Keylogger initialization failure: error , xrefs: 00409389
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                        • String ID: Keylogger initialization failure: error
                                                                        • API String ID: 3219506041-952744263
                                                                        • Opcode ID: ae81bad82633740cfd3b1ee72ad186b026eea02700e8765fb6a7155286d8ffc9
                                                                        • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                                                        • Opcode Fuzzy Hash: ae81bad82633740cfd3b1ee72ad186b026eea02700e8765fb6a7155286d8ffc9
                                                                        • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00411F34: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                                                          • Part of subcall function 00411F34: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                                                          • Part of subcall function 00411F34: RegCloseKey.KERNELBASE(?), ref: 00411F7D
                                                                        • Sleep.KERNELBASE(00000BB8), ref: 0040E243
                                                                        • ExitProcess.KERNEL32 ref: 0040E2B4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseExitOpenProcessQuerySleepValue
                                                                        • String ID: 3.8.0 Pro$override$pth_unenc$!G
                                                                        • API String ID: 2281282204-1386060931
                                                                        • Opcode ID: 10fe23117be218520d4d35d35fe488e5683950f633b047ce3d9e2e305ea30a6a
                                                                        • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                                                        • Opcode Fuzzy Hash: 10fe23117be218520d4d35d35fe488e5683950f633b047ce3d9e2e305ea30a6a
                                                                        • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1595 41936b-4193ae call 4020bf call 439adb InternetOpenW InternetOpenUrlW 1600 4193b0-4193d1 InternetReadFile 1595->1600 1601 4193d3-4193f3 call 402097 call 403356 call 401fb8 1600->1601 1602 4193f7-4193fa 1600->1602 1601->1602 1603 419400-41940d InternetCloseHandle * 2 call 439ad6 1602->1603 1604 4193fc-4193fe 1602->1604 1609 419412-41941c 1603->1609 1604->1600 1604->1603
                                                                        APIs
                                                                        • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                                                        • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                                                        • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                                                        • InternetCloseHandle.WININET(00000000), ref: 00419407
                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                                                        Strings
                                                                        • http://geoplugin.net/json.gp, xrefs: 004193A2
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Internet$CloseHandleOpen$FileRead
                                                                        • String ID: http://geoplugin.net/json.gp
                                                                        • API String ID: 3121278467-91888290
                                                                        • Opcode ID: 5ed3ca5efe6eda73ded7b75de5645582d0085ebb9c32b66323ba4650d031b915
                                                                        • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                                                        • Opcode Fuzzy Hash: 5ed3ca5efe6eda73ded7b75de5645582d0085ebb9c32b66323ba4650d031b915
                                                                        • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                                                        APIs
                                                                        • GetLocalTime.KERNEL32(00000001,00471E78,004724A8,?,?,?,?,004146CF,?,00000001), ref: 00404F61
                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00471E78,004724A8,?,?,?,?,004146CF,?,00000001), ref: 00404FAD
                                                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00005130,?,00000000,00000000), ref: 00404FC0
                                                                        Strings
                                                                        • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404F74
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Create$EventLocalThreadTime
                                                                        • String ID: Connection KeepAlive | Enabled | Timeout:
                                                                        • API String ID: 2532271599-507513762
                                                                        • Opcode ID: 4fe99452319c18cd9fdfc33eb9207e1e06689e646172ec3d575129186b5c5eec
                                                                        • Instruction ID: 3880ceca910d84d0b9b3d3001f949c19a9d90d4f91ad2e0c59d2668d569340f7
                                                                        • Opcode Fuzzy Hash: 4fe99452319c18cd9fdfc33eb9207e1e06689e646172ec3d575129186b5c5eec
                                                                        • Instruction Fuzzy Hash: 4F1127719002806AC720BB769C0DE9B7FA89BD2714F44056FF44123281D6B89445CBBA
                                                                        APIs
                                                                        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,01428430), ref: 004315FE
                                                                        • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                                                                        • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Crypt$Context$AcquireRandomRelease
                                                                        • String ID:
                                                                        • API String ID: 1815803762-0
                                                                        • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                                                        • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                                                                        • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                                                        • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                                                                        APIs
                                                                        • GetComputerNameExW.KERNELBASE(00000001,?,00000037,00471FFC), ref: 00419615
                                                                        • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Name$ComputerUser
                                                                        • String ID:
                                                                        • API String ID: 4229901323-0
                                                                        • Opcode ID: df11981a8253a9f6cfa01e36e72ce3640b108b9b137393204108e0effccf0179
                                                                        • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                                                                        • Opcode Fuzzy Hash: df11981a8253a9f6cfa01e36e72ce3640b108b9b137393204108e0effccf0179
                                                                        • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                                                                        APIs
                                                                        • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,00413F34,00471E78,00472910,00471E78,00000000,00471E78,00000000,00471E78,3.8.0 Pro), ref: 0040E2CF
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID:
                                                                        • API String ID: 2299586839-0
                                                                        • Opcode ID: 7bc4823d4125eefc11c0bf4c413f8d2ee48cbd7ba6f22e3d5f25b7b09068aca4
                                                                        • Instruction ID: e43a985d938ffd5d313bbeec62feab64fa47c80c67ee5e1720aa7bcbe65aeca7
                                                                        • Opcode Fuzzy Hash: 7bc4823d4125eefc11c0bf4c413f8d2ee48cbd7ba6f22e3d5f25b7b09068aca4
                                                                        • Instruction Fuzzy Hash: 65D05E30B4421C7BEA10D6859C0AEAA7B9CD701B62F0001A6BA08D72D0E9E1AE0487E6

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 103 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->103 80 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->80 81 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->81 90 40d991-40d99a call 401fb8 80->90 91 40d67f-40d686 80->91 98 40d622-40d63f call 401f8b call 411f34 81->98 99 40d60f-40d61c WaitForSingleObject CloseHandle 81->99 106 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 90->106 94 40d688 91->94 95 40d68a-40d6a7 GetModuleFileNameW call 4192ae 91->95 94->95 109 40d6b0-40d6b4 95->109 110 40d6a9-40d6ab 95->110 122 40d651 98->122 123 40d641-40d650 call 401f8b call 41239a 98->123 99->98 136 40dd2c 103->136 178 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 106->178 112 40d6b6-40d6c9 call 401e45 call 401f8b 109->112 113 40d717-40d72a call 401e45 call 401f8b 109->113 110->109 112->113 140 40d6cb-40d6d1 112->140 142 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 113->142 143 40d72c call 40e501 113->143 122->80 123->122 141 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 136->141 140->113 146 40d6d3-40d6d9 140->146 188 40dd6a-40dd6f call 413980 141->188 216 40d815-40d819 142->216 217 40d7af-40d7c8 call 401e45 call 401f8b call 439891 142->217 143->142 152 40d6f7-40d710 call 401f8b call 411eea 146->152 153 40d6db-40d6ee call 4060ea 146->153 152->113 177 40d712 call 4066a6 152->177 153->113 168 40d6f0-40d6f5 call 4067a0 153->168 168->113 177->113 221 40da61-40da63 178->221 222 40da65-40da67 178->222 216->106 220 40d81f-40d826 216->220 217->216 250 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 217->250 226 40d8a7-40d8b1 call 408093 220->226 227 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 220->227 228 40da6b-40da7c call 41aa4f CreateThread 221->228 223 40da69 222->223 224 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 222->224 223->228 349 40db83-40db9a call 401e45 call 401f8b 224->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 224->350 236 40d8b6-40d8de call 40245c call 43254d 226->236 227->236 228->224 257 40d8f0 236->257 258 40d8e0-40d8ee call 434c30 236->258 250->216 263 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 257->263 258->263 318 40d942-40d967 call 432556 call 401e45 call 40fbab 263->318 318->178 332 40d96d-40d98c call 401e45 call 419bca call 40de34 318->332 332->178 346 40d98e-40d990 332->346 346->90 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 371 40dc4c-40dc5e call 401e45 call 401f8b 360->371 372 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->372 361->360 383 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 371->383 384 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 371->384 372->371 383->384 404 40dcc1-40dcc2 SetProcessDEPPolicy 384->404 405 40dcc4-40dcd7 CreateThread 384->405 404->405 409 40dce5-40dcec 405->409 410 40dcd9-40dce3 CreateThread 405->410 414 40dcfa-40dd01 409->414 415 40dcee-40dcf8 CreateThread 409->415 410->409 414->136 416 40dd03-40dd06 414->416 415->414 416->188 418 40dd08-40dd0d 416->418 418->141
                                                                        APIs
                                                                          • Part of subcall function 0041A8DA: LoadLibraryA.KERNELBASE(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                                                          • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                                                          • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                                                          • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                                                          • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                                                          • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                                                          • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                                                        • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                                                          • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                                                        • String ID: (#G$0"G$0"G$0"G$Access Level: $Administrator$C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                                                                        • API String ID: 1529173511-199704473
                                                                        • Opcode ID: dd65878180a8eb21c8e453a0102f0fa45c87516c1ab46bdc0214b95a92d0de7d
                                                                        • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                                                        • Opcode Fuzzy Hash: dd65878180a8eb21c8e453a0102f0fa45c87516c1ab46bdc0214b95a92d0de7d
                                                                        • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 420 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 433 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 420->433 434 4139ca-4139d1 Sleep 420->434 449 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 433->449 450 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 433->450 434->433 449->450 503 413b42-413b49 450->503 504 413b34-413b40 450->504 505 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 503->505 504->505 532 413be2-413c26 WSAGetLastError call 41a86b call 4052dd call 402073 call 4194da call 401fb8 505->532 533 413c2b-413c39 call 40480d 505->533 555 414493-4144a5 call 404e06 call 4021da 532->555 538 413c66-413c7b call 404f31 call 4048a8 533->538 539 413c3b-413c61 call 402073 * 2 call 4194da 533->539 554 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 538->554 538->555 539->555 620 413dd6-413de3 call 405a86 554->620 621 413de8-413e0f call 401f8b call 411f91 554->621 569 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 555->569 570 4144cd-4144d5 call 401e6d 555->570 569->570 570->450 620->621 627 413e11-413e13 621->627 628 413e16-41419b call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 621->628 627->628 744 41419d call 404a81 628->744 745 4141a2-4143fa call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 744->745 855 4143ff-414406 745->855 856 414408-41440f 855->856 857 41441a-414421 855->857 856->857 858 414411-414413 856->858 859 414423-414428 call 409f9a 857->859 860 41442d-41445f call 405a4b call 402073 * 2 call 4194da 857->860 858->857 859->860 871 414461-41446d CreateThread 860->871 872 414473-41448e call 401fb8 * 2 call 401ee9 860->872 871->872 872->555
                                                                        APIs
                                                                        • Sleep.KERNEL32(00000000,00000029,74DF0F10,00471FFC,00000000), ref: 004139D1
                                                                        • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                                                                        • Sleep.KERNEL32(00000000,00000002), ref: 004144C7
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Sleep$ErrorLastLocalTime
                                                                        • String ID: | $%I64u$3.8.0 Pro$C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$H"G$TLS Off$TLS On $`"G$hlight$name$!G
                                                                        • API String ID: 524882891-3943398318
                                                                        • Opcode ID: 3ad6bef8c9167f125cafd4b3bb3b20f4350355bdd21fac32cee10a63cbc7f210
                                                                        • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                                                                        • Opcode Fuzzy Hash: 3ad6bef8c9167f125cafd4b3bb3b20f4350355bdd21fac32cee10a63cbc7f210
                                                                        • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • connect.WS2_32(?,?,?), ref: 004048C0
                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049EE
                                                                        • WSAGetLastError.WS2_32 ref: 00404A01
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                        • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                        • API String ID: 994465650-2151626615
                                                                        • Opcode ID: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                                                        • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                                                        • Opcode Fuzzy Hash: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                                                        • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • __Init_thread_footer.LIBCMT ref: 00409C81
                                                                        • Sleep.KERNELBASE(000001F4), ref: 00409C8C
                                                                        • GetForegroundWindow.USER32 ref: 00409C92
                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                                                                        • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                                                                        • Sleep.KERNEL32(000003E8), ref: 00409D9D
                                                                          • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                        • String ID: [${ User has been idle for $ minutes }$]
                                                                        • API String ID: 911427763-3954389425
                                                                        • Opcode ID: ee9b949ba4685117d773663a634f46785a27bf3fcb47f19481d588488b50e058
                                                                        • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                                                                        • Opcode Fuzzy Hash: ee9b949ba4685117d773663a634f46785a27bf3fcb47f19481d588488b50e058
                                                                        • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1034 40c5ed-40c612 call 401f66 1037 40c618 1034->1037 1038 40c73c-40c762 call 401ee4 GetLongPathNameW call 40415e 1034->1038 1040 40c711-40c716 1037->1040 1041 40c654-40c659 1037->1041 1042 40c727 1037->1042 1043 40c718-40c71d call 439e5f 1037->1043 1044 40c629-40c637 call 41959f call 401ef3 1037->1044 1045 40c64a-40c64f 1037->1045 1046 40c70a-40c70f 1037->1046 1047 40c65e-40c665 call 419f23 1037->1047 1048 40c61f-40c624 1037->1048 1062 40c767-40c7d4 call 40415e call 40c7f9 call 402f85 * 2 call 401ee9 * 5 1038->1062 1049 40c72c-40c731 call 439e5f 1040->1049 1041->1049 1042->1049 1058 40c722-40c725 1043->1058 1065 40c63c 1044->1065 1045->1049 1046->1049 1063 40c667-40c6b7 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1047->1063 1064 40c6b9-40c705 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1047->1064 1048->1049 1059 40c732-40c737 call 408093 1049->1059 1058->1042 1058->1059 1059->1038 1070 40c640-40c645 call 401ee9 1063->1070 1064->1065 1065->1070 1070->1038
                                                                        APIs
                                                                        • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040C753
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: LongNamePath
                                                                        • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                        • API String ID: 82841172-425784914
                                                                        • Opcode ID: f14e1be72a0680fbe39d61d121e9cc05331f57ab813806ef295ab36cc5fa3876
                                                                        • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                                                        • Opcode Fuzzy Hash: f14e1be72a0680fbe39d61d121e9cc05331f57ab813806ef295ab36cc5fa3876
                                                                        • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1116 4144da-41455d call 4020d6 SetEvent call 401f8b call 404182 call 4020d6 * 2 call 419d87 1129 415281-41528a 1116->1129 1130 414563 1116->1130 1133 415290-415297 1129->1133 1134 415654-41567d call 401e6d call 401fb8 * 2 1129->1134 1131 414569-41456d 1130->1131 1132 415188-415248 call 4157e1 call 401e45 call 401f8b call 439867 call 415ceb call 408b5f call 401e45 call 4020d6 call 401e45 call 4020d6 call 401e45 call 401f8b call 40415e call 401e45 call 401f8b call 40415e call 40838e 1130->1132 1131->1134 1135 414573-414575 1131->1135 1392 415270-41527c call 408ae3 1132->1392 1393 41524a-41526b call 408b73 call 408aee call 408b0f 1132->1393 1133->1134 1136 4152c1-4152e1 call 401e45 call 401f8b call 439867 call 408a88 1133->1136 1137 4155a3-4155a8 call 418e2b 1133->1137 1138 4152e6-41535a call 401e45 call 401f8b StrToIntA call 401e45 call 401f8b call 40c5ed call 401ee4 call 401e45 call 41a27c call 401ee4 call 41a76c call 401ee9 1133->1138 1139 4154e6-415501 call 401e45 call 4020d6 call 4159ba 1133->1139 1140 415506-41550b call 418e33 1133->1140 1141 4153ca 1133->1141 1142 4155ad-4155eb call 4066a6 call 401e45 call 419b16 call 402ef0 * 2 1133->1142 1143 41548f-4154ae call 401e45 call 405ae5 1133->1143 1144 41558f-415594 call 418ccd 1133->1144 1145 4153d1-4153d4 1133->1145 1146 415510-415517 1133->1146 1147 415412-41542d call 401e45 call 4020d6 call 417a63 1133->1147 1148 415432-41544d call 401e45 call 4020d6 call 403f08 1133->1148 1149 415452-41548a call 401e45 call 401f8b call 402073 call 401f8b call 41215f 1133->1149 1150 4155f5-41564f call 405b0b call 401e45 * 2 call 402f11 call 402ef0 call 405e74 call 401fb8 * 2 1133->1150 1151 415599-41559e call 418dec 1133->1151 1152 4153da-415407 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 SetWindowTextW 1133->1152 1153 41555d-41558a call 401e45 call 4051c3 call 401e45 call 418dcb 1133->1153 1154 41535f-4153c5 call 407ba0 call 401e45 call 4020d6 call 401e45 call 4020d6 call 401e45 call 4020d6 call 40631d call 407bae 1133->1154 1155 41529e-4152b4 call 401e45 call 4020d6 1133->1155 1171 414728-41472f 1135->1171 1172 41457c-4145ad GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 1135->1172 1136->1134 1137->1134 1138->1134 1140->1134 1141->1145 1142->1150 1241 4154b0-4154c5 call 401e45 call 4020d6 1143->1241 1242 4154c7-4154d7 call 401e45 call 4020d6 1143->1242 1144->1134 1145->1152 1160 415519-415539 call 41aa4f CreateThread 1146->1160 1161 41553e-415558 ShowWindow SetForegroundWindow 1146->1161 1243 4152b9-4152bc 1147->1243 1148->1243 1149->1134 1150->1134 1354 41564f call 401fb8 1150->1354 1151->1134 1152->1147 1153->1134 1154->1134 1155->1243 1244 4152b4 call 406bda 1155->1244 1160->1134 1161->1134 1198 4146f5-4146fa call 4050c4 1171->1198 1303 4145b2-4146ac call 419c8a call 401e45 call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 404a81 call 401fb8 * 6 call 401ee9 call 401fb8 * 2 call 401e45 call 401f8b call 439867 1172->1303 1198->1134 1310 4154dc-4154e1 call 4157f2 1241->1310 1242->1310 1243->1134 1244->1243 1418 4146d4-4146ec call 401e45 call 405ae5 1303->1418 1419 4146ae-4146ba call 4046d3 1303->1419 1310->1134 1354->1134 1392->1134 1393->1392 1418->1134 1432 4146f2-4146f3 1418->1432 1424 4146c7-4146cf call 404f31 1419->1424 1425 4146bc-4146c2 call 404fd4 1419->1425 1424->1134 1425->1134 1432->1198
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CountEventTick
                                                                        • String ID: hlight
                                                                        • API String ID: 180926312-4166879102
                                                                        • Opcode ID: 74674c4d36b64513a33f3a8a362c24ec0eba09eab129ba226e62dfafbf294fe1
                                                                        • Instruction ID: 7f41fae5545cdca8eca7c99371018f0a574a5a1f26b79566ba600277ca1907d5
                                                                        • Opcode Fuzzy Hash: 74674c4d36b64513a33f3a8a362c24ec0eba09eab129ba226e62dfafbf294fe1
                                                                        • Instruction Fuzzy Hash: 02F1A0316043009BC614FB72D957AEE72A9AF90308F50093FB546A71E2EE7C9949C79F

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • Sleep.KERNELBASE(00001388), ref: 00409738
                                                                          • Part of subcall function 0040966D: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                                                          • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                                                          • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                                                          • Part of subcall function 0040966D: CloseHandle.KERNELBASE(00000000,?,?,?,00409745), ref: 004096E6
                                                                        • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 00409774
                                                                        • GetFileAttributesW.KERNELBASE(00000000), ref: 00409785
                                                                        • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 0040979C
                                                                        • PathFileExistsW.KERNELBASE(00000000,00000000,00000000,00000012), ref: 00409816
                                                                          • Part of subcall function 0041A20F: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                        • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                        • String ID: H"G$H"G
                                                                        • API String ID: 3795512280-1424798214
                                                                        • Opcode ID: b8336bd786565f66fdc5ece92215671476f6ca181f44d705e0a27e626737db20
                                                                        • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                                                        • Opcode Fuzzy Hash: b8336bd786565f66fdc5ece92215671476f6ca181f44d705e0a27e626737db20
                                                                        • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1613 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1624 419307-419316 call 411f91 1613->1624 1625 419348-419351 1613->1625 1630 41931b-419332 call 401f8b StrToIntA 1624->1630 1626 419353-419358 1625->1626 1627 41935a 1625->1627 1629 41935f-41936a call 40535d 1626->1629 1627->1629 1635 419340-419343 call 401fb8 1630->1635 1636 419334-41933d call 41accf 1630->1636 1635->1625 1636->1635
                                                                        APIs
                                                                          • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                          • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,00000000,00000000,00000000), ref: 00411FB5
                                                                          • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                          • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(00000000), ref: 00411FDD
                                                                        • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCurrentOpenProcessQueryValue
                                                                        • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                        • API String ID: 1866151309-2070987746
                                                                        • Opcode ID: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                                                        • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                                                        • Opcode Fuzzy Hash: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                                                        • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1640 40966d-40967d 1641 409683-409685 1640->1641 1642 40971a-40971d 1640->1642 1643 409688-4096ae call 401ee4 CreateFileW 1641->1643 1646 4096b0-4096be GetFileSize 1643->1646 1647 4096ee 1643->1647 1648 4096c0 1646->1648 1649 4096e5-4096ec CloseHandle 1646->1649 1650 4096f1-4096f5 1647->1650 1651 4096c2-4096c8 1648->1651 1652 4096ca-4096d1 1648->1652 1649->1650 1650->1643 1653 4096f7-4096fa 1650->1653 1651->1649 1651->1652 1654 4096d3-4096d5 call 40a025 1652->1654 1655 4096da-4096df Sleep 1652->1655 1653->1642 1656 4096fc-409703 1653->1656 1654->1655 1655->1649 1656->1642 1658 409705-409715 call 408098 call 409203 1656->1658 1658->1642
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                                                        • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                                                        • CloseHandle.KERNELBASE(00000000,?,?,?,00409745), ref: 004096E6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CloseCreateHandleSizeSleep
                                                                        • String ID: h G
                                                                        • API String ID: 1958988193-3300504347
                                                                        • Opcode ID: 13e975a3868741cffac1d73112577800afb55aac81ce9bb8c63aa5aacad1b37c
                                                                        • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                                                        • Opcode Fuzzy Hash: 13e975a3868741cffac1d73112577800afb55aac81ce9bb8c63aa5aacad1b37c
                                                                        • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 1662 41a17b-41a18c 1663 41a1a4-41a1ab 1662->1663 1664 41a18e-41a191 1662->1664 1667 41a1ac-41a1c5 CreateFileW 1663->1667 1665 41a193-41a198 1664->1665 1666 41a19a-41a1a2 1664->1666 1665->1667 1666->1667 1668 41a1c7-41a1c9 1667->1668 1669 41a1cb-41a1d0 1667->1669 1672 41a209-41a20e 1668->1672 1670 41a1d2-41a1e0 SetFilePointer 1669->1670 1671 41a1eb-41a1fc WriteFile 1669->1671 1670->1671 1673 41a1e2-41a1e9 CloseHandle 1670->1673 1674 41a200-41a207 CloseHandle 1671->1674 1675 41a1fe 1671->1675 1673->1668 1674->1672 1675->1674
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,004098DF,?,00000000,00000000), ref: 0041A1D7
                                                                        • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A1E3
                                                                        • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,004098DF,?,00000000,00000000), ref: 0041A1F4
                                                                        • CloseHandle.KERNELBASE(00000000,?,004098DF,?,00000000,00000000), ref: 0041A201
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CloseHandle$CreatePointerWrite
                                                                        • String ID:
                                                                        • API String ID: 1852769593-0
                                                                        • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                                                        • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                                                        • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                                                        • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • CreateThread.KERNELBASE(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                                                        • CreateThread.KERNELBASE(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                                                          • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                          • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateThread$LocalTimewsprintf
                                                                        • String ID: Offline Keylogger Started
                                                                        • API String ID: 465354869-4114347211
                                                                        • Opcode ID: 4f413bfeddc20b053a911010c7dd0c78c6d83759768fb02ef20824c4023f4b57
                                                                        • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                                                        • Opcode Fuzzy Hash: 4f413bfeddc20b053a911010c7dd0c78c6d83759768fb02ef20824c4023f4b57
                                                                        • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF
                                                                        APIs
                                                                        • RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004630C0), ref: 0041216E
                                                                        • RegSetValueExA.KERNELBASE(004630C0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041A83B,WallpaperStyle,004630C0), ref: 00412196
                                                                        • RegCloseKey.KERNELBASE(004630C0,?,?,0041A83B,WallpaperStyle,004630C0), ref: 004121A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCreateValue
                                                                        • String ID: Control Panel\Desktop
                                                                        • API String ID: 1818849710-27424756
                                                                        • Opcode ID: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                                                        • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                                                                        • Opcode Fuzzy Hash: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                                                        • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94
                                                                        APIs
                                                                        • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                                                        • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                                                        • RegCloseKey.KERNELBASE(?), ref: 00411F7D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseOpenQueryValue
                                                                        • String ID: pth_unenc
                                                                        • API String ID: 3677997916-4028850238
                                                                        • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                                                        • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                                                                        • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                                                        • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94
                                                                        APIs
                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00471EE8), ref: 00404D93
                                                                        • CreateThread.KERNELBASE(00000000,00000000,?,00471E90,00000000,00000000), ref: 00404DA7
                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DB2
                                                                        • CloseHandle.KERNELBASE(?,?,00000000), ref: 00404DBB
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                        • String ID:
                                                                        • API String ID: 3360349984-0
                                                                        • Opcode ID: 065d974023d608d9e5a1c7ca2dcb3521b24bc23c5e7a56f3f776532f1b505451
                                                                        • Instruction ID: 0d5bef4af40d9751d8a4c840d6feadb85822b330c50e1cee3accc81e25362d00
                                                                        • Opcode Fuzzy Hash: 065d974023d608d9e5a1c7ca2dcb3521b24bc23c5e7a56f3f776532f1b505451
                                                                        • Instruction Fuzzy Hash: DA4194712083016FCB11FB61CD55D6FB7EDAFD4314F400A3EB982A32E2DB7899098666
                                                                        APIs
                                                                        • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                                                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CloseCreateHandleReadSize
                                                                        • String ID:
                                                                        • API String ID: 3919263394-0
                                                                        • Opcode ID: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                                                        • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                                                        • Opcode Fuzzy Hash: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                                                        • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                                                        APIs
                                                                        • RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,00000000,00000000,00000000), ref: 00411FB5
                                                                        • RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                        • RegCloseKey.KERNELBASE(00000000), ref: 00411FDD
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseOpenQueryValue
                                                                        • String ID:
                                                                        • API String ID: 3677997916-0
                                                                        • Opcode ID: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                                                        • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                                                                        • Opcode Fuzzy Hash: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                                                        • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8
                                                                        APIs
                                                                        • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                        • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                        • RegCloseKey.KERNELBASE(00000000), ref: 00412128
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseOpenQueryValue
                                                                        • String ID:
                                                                        • API String ID: 3677997916-0
                                                                        • Opcode ID: 08dfe5805927a3105be2cef522098962c51c3fb91925cefe59c604f33ef5df72
                                                                        • Instruction ID: 61f3e32b1c93232b19bf4a4cc48abe95026028d342b1827e6ec6edb2467bbf34
                                                                        • Opcode Fuzzy Hash: 08dfe5805927a3105be2cef522098962c51c3fb91925cefe59c604f33ef5df72
                                                                        • Instruction Fuzzy Hash: 4C014B31800229BBCF219F91DC49DEB7F29EF05761F0141A5BE08A2161D63589BADBA4
                                                                        APIs
                                                                        • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocateHeap
                                                                        • String ID: P@
                                                                        • API String ID: 1279760036-676759640
                                                                        • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                                                        • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                                                        • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                                                        • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                                                                        APIs
                                                                        • GlobalMemoryStatusEx.KERNELBASE(?), ref: 004197AB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: GlobalMemoryStatus
                                                                        • String ID: @
                                                                        • API String ID: 1890195054-2766056989
                                                                        • Opcode ID: 257335e8d7f90f302e1c63bcee3e650057a1d083b4c07430f2bdd1a346c4e461
                                                                        • Instruction ID: 916baa9f79c233f702b1e805244b950efce88069b4bce771f790cc973d6f5f79
                                                                        • Opcode Fuzzy Hash: 257335e8d7f90f302e1c63bcee3e650057a1d083b4c07430f2bdd1a346c4e461
                                                                        • Instruction Fuzzy Hash: 6DD017B58023189FC720DFA8E904A8DBBFCFB08214F00026AEC49E3300E770A8008B84
                                                                        APIs
                                                                        • _free.LIBCMT ref: 004436B8
                                                                          • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00430CB7,00000000,0000000F,0042D6C1,?,?,0042F768,?,?,00000000), ref: 004436F4
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocateHeap$_free
                                                                        • String ID:
                                                                        • API String ID: 1482568997-0
                                                                        • Opcode ID: e0f464859dd348f1fcd6b7cf27edbe1d1103636ea8f71a568145896bc952c0a8
                                                                        • Instruction ID: 1ca59af56198d509cf9e402e21e9c8c5a276ccba14ddaf673a50935c82dc1d11
                                                                        • Opcode Fuzzy Hash: e0f464859dd348f1fcd6b7cf27edbe1d1103636ea8f71a568145896bc952c0a8
                                                                        • Instruction Fuzzy Hash: F0F062322012177AFB312E27AC05A6B37599F81F77F23412BF954A6391EA3CDA01456E
                                                                        APIs
                                                                        • socket.WS2_32(?,00000001,00000006), ref: 00404832
                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,004052EB,?,?,00000000,00000000,?,?,00000000,004051E8,?,00000000), ref: 0040486E
                                                                          • Part of subcall function 0040487E: WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateEventStartupsocket
                                                                        • String ID:
                                                                        • API String ID: 1953588214-0
                                                                        • Opcode ID: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                                                        • Instruction ID: 6a7ca6a32121b389846a28cffc2ecd87dee0ffbb862a0929ff73aad7f5bc5f79
                                                                        • Opcode Fuzzy Hash: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                                                        • Instruction Fuzzy Hash: 3301B1B14087809FD7349F28B8446877FE0AB15300F048D6EF1CA93BA1D3B1A444CB18
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                                                        • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                                                        • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                                                        • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                                                                        APIs
                                                                        • GetForegroundWindow.USER32(?,004724A0), ref: 00419A9B
                                                                        • GetWindowTextW.USER32(00000000,?,00000200), ref: 00419AAA
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Window$ForegroundText
                                                                        • String ID:
                                                                        • API String ID: 29597999-0
                                                                        • Opcode ID: 1f1045fbb1326304bb9d2aba07e73948de2e411708f4164bbb64d7074dfbb319
                                                                        • Instruction ID: cf2e52be04f8ec8d08d18c914cdb682983edf2912a2e664b649e3c091a1f3b93
                                                                        • Opcode Fuzzy Hash: 1f1045fbb1326304bb9d2aba07e73948de2e411708f4164bbb64d7074dfbb319
                                                                        • Instruction Fuzzy Hash: 8FE09B76D0031867EB2067A5EC4DFEBB77CEB84711F0401AEF918D3142E974990486E4
                                                                        APIs
                                                                        • getaddrinfo.WS2_32(00000000,00000000,00000000,0046FACC,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                                                                        • WSASetLastError.WS2_32(00000000), ref: 00413966
                                                                          • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                                                          • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                                                                          • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                                                          • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                                                                          • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                                                                          • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                                                          • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                                                          • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                        • String ID:
                                                                        • API String ID: 1170566393-0
                                                                        • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                                                        • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                                                                        • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                                                        • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD
                                                                        APIs
                                                                        • _wcslen.LIBCMT ref: 00408F39
                                                                          • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                                                          • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                                                          • Part of subcall function 00409203: CreateThread.KERNELBASE(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateThread$_wcslen
                                                                        • String ID:
                                                                        • API String ID: 1119755333-0
                                                                        • Opcode ID: a4cf6233b645aec8069e012e89874406b6158c7e2554cf9ff51d1662effb5250
                                                                        • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                                                                        • Opcode Fuzzy Hash: a4cf6233b645aec8069e012e89874406b6158c7e2554cf9ff51d1662effb5250
                                                                        • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                                                                        APIs
                                                                        • WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Startup
                                                                        • String ID:
                                                                        • API String ID: 724789610-0
                                                                        • Opcode ID: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                                                        • Instruction ID: a9c8eddc0db4f5dff40e6a71866b0cfb015b1534c728beba927ba249e589f683
                                                                        • Opcode Fuzzy Hash: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                                                        • Instruction Fuzzy Hash: C2D0123255860C4ED610ABB4AD0F8A5775CC313A16F4003BAACB9835D3F640571CC2AB
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: recv
                                                                        • String ID:
                                                                        • API String ID: 1507349165-0
                                                                        • Opcode ID: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                                                        • Instruction ID: 0df3b2746f7319e4a339c8fc0296cb6b5099ceb5184c402daa9575d879af207d
                                                                        • Opcode Fuzzy Hash: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                                                        • Instruction Fuzzy Hash: 81B09B75105201BFC6150750CD0486E7DA597C8381B40491CB14641171C535C4505715
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: send
                                                                        • String ID:
                                                                        • API String ID: 2809346765-0
                                                                        • Opcode ID: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                                                        • Instruction ID: 7b6f63586de962cf13c642be8f044126cb3c52731424b67aaf056de8313b57d0
                                                                        • Opcode Fuzzy Hash: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                                                        • Instruction Fuzzy Hash: 41B092B9108302BFCA160B60CC0887A7EA6ABC8786B00882CF546421B0C636C460AB2A
                                                                        APIs
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                                                          • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                                                          • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                                                          • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                                                        • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                                                        • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                        • String ID: (#G$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                                                                        • API String ID: 3018269243-1736093966
                                                                        • Opcode ID: 49c56e30f16afa7b236da27895c5c70f34eeff9bf263767f02d9655acb58ee55
                                                                        • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                                                        • Opcode Fuzzy Hash: 49c56e30f16afa7b236da27895c5c70f34eeff9bf263767f02d9655acb58ee55
                                                                        • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                                                                        APIs
                                                                        • SetEvent.KERNEL32(?,?), ref: 00406D4A
                                                                        • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                                                                          • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                                                          • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                                                          • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                                                          • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                                                          • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                          • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                                                          • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                                                                        • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                                                                        • DeleteFileA.KERNEL32(?), ref: 0040768E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$Find$DeleteDirectoryEventRemove$AttributesCloseDriveExecuteFirstLocalLogicalNextObjectShellSingleStringsTimeWaitsend
                                                                        • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                                                                        • API String ID: 1385304114-1507758755
                                                                        • Opcode ID: be7b48f86056108733fc4d00611fc66ffd45fa632cbaf76da7a7745e40d65eda
                                                                        • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                                                                        • Opcode Fuzzy Hash: be7b48f86056108733fc4d00611fc66ffd45fa632cbaf76da7a7745e40d65eda
                                                                        • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                                                                        APIs
                                                                        • __Init_thread_footer.LIBCMT ref: 004056C6
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        • __Init_thread_footer.LIBCMT ref: 00405703
                                                                        • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                                                        • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                                                        • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                                                        • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                                                        • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                                                          • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                        • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                                                        • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                                                        • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                                                        • CloseHandle.KERNEL32 ref: 00405A03
                                                                        • CloseHandle.KERNEL32 ref: 00405A0B
                                                                        • CloseHandle.KERNEL32 ref: 00405A1D
                                                                        • CloseHandle.KERNEL32 ref: 00405A25
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                        • String ID: SystemDrive$cmd.exe
                                                                        • API String ID: 2994406822-3633465311
                                                                        • Opcode ID: 624b23ae9c7fa0b2d8e739e58b23e183908c453dc879b721c41d8bd3b07c5815
                                                                        • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                                                        • Opcode Fuzzy Hash: 624b23ae9c7fa0b2d8e739e58b23e183908c453dc879b721c41d8bd3b07c5815
                                                                        • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                                                        APIs
                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                                                        • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                                                        • FindClose.KERNEL32(00000000), ref: 0040AC53
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Find$CloseFile$FirstNext
                                                                        • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                        • API String ID: 1164774033-3681987949
                                                                        • Opcode ID: a020e11340127684296a5dec1f59da99f0b8311f4653163e0ba6c10d3973d13c
                                                                        • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                                                        • Opcode Fuzzy Hash: a020e11340127684296a5dec1f59da99f0b8311f4653163e0ba6c10d3973d13c
                                                                        • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                                                        APIs
                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                                                                        • FindClose.KERNEL32(00000000), ref: 0040AD0A
                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                                                                        • FindClose.KERNEL32(00000000), ref: 0040ADF0
                                                                        • FindClose.KERNEL32(00000000), ref: 0040AE11
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Find$Close$File$FirstNext
                                                                        • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                        • API String ID: 3527384056-432212279
                                                                        • Opcode ID: 051afc5ab64b8879b9b7a46cadaf8c8d05a6d0522a74f3520d4db6abcb3a3bf1
                                                                        • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                                                                        • Opcode Fuzzy Hash: 051afc5ab64b8879b9b7a46cadaf8c8d05a6d0522a74f3520d4db6abcb3a3bf1
                                                                        • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                                                                        APIs
                                                                        • OpenClipboard.USER32 ref: 00414EC2
                                                                        • EmptyClipboard.USER32 ref: 00414ED0
                                                                        • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                                                                        • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                                                                        • CloseClipboard.USER32 ref: 00414F55
                                                                        • OpenClipboard.USER32 ref: 00414F5C
                                                                        • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                                                        • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                                                        • CloseClipboard.USER32 ref: 00414F84
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                        • String ID:
                                                                        • API String ID: 3520204547-0
                                                                        • Opcode ID: 225a970afa4932c8de6465126e6a4b6a6b0313af119945552a448f0396d6411b
                                                                        • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                                                                        • Opcode Fuzzy Hash: 225a970afa4932c8de6465126e6a4b6a6b0313af119945552a448f0396d6411b
                                                                        • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                                                                          • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                                                        • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                        • String ID: pth_unenc
                                                                        • API String ID: 2341273852-4028850238
                                                                        • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                                                        • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                                                        • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                                                        • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 0$1$2$3$4$5$6$7
                                                                        • API String ID: 0-3177665633
                                                                        • Opcode ID: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                                                        • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                                                        • Opcode Fuzzy Hash: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                                                        • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                                                        APIs
                                                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                                                        • GetLastError.KERNEL32 ref: 00418771
                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                        • String ID:
                                                                        • API String ID: 3587775597-0
                                                                        • Opcode ID: dbef2e9e75756a76dd866138ce6b66fba5a6b26afa9a1f1947bb5a3c6cf8ec44
                                                                        • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                                                        • Opcode Fuzzy Hash: dbef2e9e75756a76dd866138ce6b66fba5a6b26afa9a1f1947bb5a3c6cf8ec44
                                                                        • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000,?,?), ref: 0040B2DC
                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?), ref: 0040B3AF
                                                                        • FindClose.KERNEL32(00000000,?,?), ref: 0040B3BE
                                                                        • FindClose.KERNEL32(00000000,?,?), ref: 0040B3E9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Find$CloseFile$FirstNext
                                                                        • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                        • API String ID: 1164774033-405221262
                                                                        • Opcode ID: 541780f21c7242fcae788b17a0f2845b2004f92ac30ce3fbff80c0217293d7dc
                                                                        • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                                                        • Opcode Fuzzy Hash: 541780f21c7242fcae788b17a0f2845b2004f92ac30ce3fbff80c0217293d7dc
                                                                        • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                                                        APIs
                                                                        • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                        • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                        • API String ID: 2127411465-314212984
                                                                        • Opcode ID: 03a8caf829f2285c7126f34d5bd4ce103e5afe8f8d87be2232f03e083c4fe4fb
                                                                        • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                                                        • Opcode Fuzzy Hash: 03a8caf829f2285c7126f34d5bd4ce103e5afe8f8d87be2232f03e083c4fe4fb
                                                                        • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                                                        APIs
                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                                                        • GetLastError.KERNEL32 ref: 0040A999
                                                                        Strings
                                                                        • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                                                        • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                                                        • UserProfile, xrefs: 0040A95F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DeleteErrorFileLast
                                                                        • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                        • API String ID: 2018770650-1062637481
                                                                        • Opcode ID: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                                                        • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                                                        • Opcode Fuzzy Hash: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                                                        • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                                                        • GetLastError.KERNEL32 ref: 00415CDB
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                        • String ID: SeShutdownPrivilege
                                                                        • API String ID: 3534403312-3733053543
                                                                        • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                                                        • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                                                                        • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                                                        • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                                                                        APIs
                                                                        • __EH_prolog.LIBCMT ref: 00408393
                                                                          • Part of subcall function 004048A8: connect.WS2_32(?,?,?), ref: 004048C0
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                                                        • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                                                          • Part of subcall function 00404E06: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                                                          • Part of subcall function 00404E06: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                                                          • Part of subcall function 00404E06: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                                                        • FindClose.KERNEL32(00000000), ref: 004086F4
                                                                          • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                                                          • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                        • String ID:
                                                                        • API String ID: 1824512719-0
                                                                        • Opcode ID: ec8458d17bdc53f7f2a354f9d2f28928e38656fc3ee44d0073de126596356183
                                                                        • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                                                        • Opcode Fuzzy Hash: ec8458d17bdc53f7f2a354f9d2f28928e38656fc3ee44d0073de126596356183
                                                                        • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                                                        APIs
                                                                          • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                                                        • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                                                        • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                                                        • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                                                                          • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                                                                        • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                                                                        • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                                                                          • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                                                                          • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                        • String ID:
                                                                        • API String ID: 3950776272-0
                                                                        • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                                                        • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                                                        • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                                                        • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                                                        APIs
                                                                        • GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                                                        • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                                                        • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                                                        • GetKeyState.USER32(00000010), ref: 004094B8
                                                                        • GetKeyboardState.USER32(?), ref: 004094C5
                                                                        • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                                                        • String ID:
                                                                        • API String ID: 3566172867-0
                                                                        • Opcode ID: b347f1a6ebd5a27a3c62a6440ea9f983a5eff6272c066a99259600f45f129da1
                                                                        • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                                                        • Opcode Fuzzy Hash: b347f1a6ebd5a27a3c62a6440ea9f983a5eff6272c066a99259600f45f129da1
                                                                        • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                                                                        APIs
                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                                                        • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Service$CloseHandle$Open$ManagerStart
                                                                        • String ID:
                                                                        • API String ID: 276877138-0
                                                                        • Opcode ID: 637da124ebd858597763fdc0195e491a5d188b8048d228e092eb7bdd2ad61358
                                                                        • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                                                        • Opcode Fuzzy Hash: 637da124ebd858597763fdc0195e491a5d188b8048d228e092eb7bdd2ad61358
                                                                        • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                                                        • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                                                          • Part of subcall function 0041A20F: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$Find$CreateFirstNext
                                                                        • String ID: H"G$`'G$`'G
                                                                        • API String ID: 341183262-2774397156
                                                                        • Opcode ID: 906c3186d85bf702cc58fb4217b64a4f550f06d8cb2ef44d4736f285f11a90b4
                                                                        • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                                                        • Opcode Fuzzy Hash: 906c3186d85bf702cc58fb4217b64a4f550f06d8cb2ef44d4736f285f11a90b4
                                                                        • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                                                        APIs
                                                                          • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                                                          • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                                                          • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                                                          • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                                                          • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                                                                        • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                                                                        • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                        • String ID: PowrProf.dll$SetSuspendState
                                                                        • API String ID: 1589313981-1420736420
                                                                        • Opcode ID: 17cf6758eb2c2054c5282ca271a9faabb757e674f29873d187fc5e8afb77bb72
                                                                        • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                                                                        • Opcode Fuzzy Hash: 17cf6758eb2c2054c5282ca271a9faabb757e674f29873d187fc5e8afb77bb72
                                                                        • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                                                                        APIs
                                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 0044F6B5
                                                                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 0044F6DE
                                                                        • GetACP.KERNEL32 ref: 0044F6F3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID: ACP$OCP
                                                                        • API String ID: 2299586839-711371036
                                                                        • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                                                        • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                                                        • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                                                        • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                                                        APIs
                                                                        • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                                                        • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                                                        • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                                                        • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                        • String ID: SETTINGS
                                                                        • API String ID: 3473537107-594951305
                                                                        • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                                                        • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                                                        • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                                                        • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                                                        APIs
                                                                        • __EH_prolog.LIBCMT ref: 004087A5
                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                                                        • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Find$File$CloseFirstH_prologNext
                                                                        • String ID:
                                                                        • API String ID: 1157919129-0
                                                                        • Opcode ID: 2e71961cec25391ebbb7e1a70996e42e3db4d1c5cdad913aed2fc17b20c8d8cc
                                                                        • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                                                        • Opcode Fuzzy Hash: 2e71961cec25391ebbb7e1a70996e42e3db4d1c5cdad913aed2fc17b20c8d8cc
                                                                        • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                        • GetUserDefaultLCID.KERNEL32 ref: 0044F8FC
                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 0044F9CD
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                        • String ID:
                                                                        • API String ID: 745075371-0
                                                                        • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                        • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                                                        • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                        • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                                                        APIs
                                                                        • __EH_prolog.LIBCMT ref: 0040784D
                                                                        • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                        • String ID:
                                                                        • API String ID: 1771804793-0
                                                                        • Opcode ID: 11d20b60ac49935fc5575683e5e557c5dcccdb0915203e6978057b8ef5f72254
                                                                        • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                                                        • Opcode Fuzzy Hash: 11d20b60ac49935fc5575683e5e557c5dcccdb0915203e6978057b8ef5f72254
                                                                        • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                                                        APIs
                                                                          • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                                                          • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                                                          • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ProcessProcess32$NextOpen$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 1735047541-0
                                                                        • Opcode ID: 8bd51d8584b97cc885867124c5bad1c0f2569ec35f654b9f455fc912ba92ee5a
                                                                        • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                                                        • Opcode Fuzzy Hash: 8bd51d8584b97cc885867124c5bad1c0f2569ec35f654b9f455fc912ba92ee5a
                                                                        • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                                                        APIs
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DownloadExecuteFileShell
                                                                        • String ID: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe$open
                                                                        • API String ID: 2825088817-3105128508
                                                                        • Opcode ID: 8f1b740c4381841e2bf9858c5468f91d8fb9aefc153a3742329f4a9d8f520edc
                                                                        • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                                                        • Opcode Fuzzy Hash: 8f1b740c4381841e2bf9858c5468f91d8fb9aefc153a3742329f4a9d8f520edc
                                                                        • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                                                        APIs
                                                                        • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                                                          • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,Control Panel\Desktop,004630C0), ref: 0041216E
                                                                          • Part of subcall function 0041215F: RegSetValueExA.KERNELBASE(004630C0,?,00000000,?,00000000,00000000,Control Panel\Desktop,?,?,0041A83B,WallpaperStyle,004630C0), ref: 00412196
                                                                          • Part of subcall function 0041215F: RegCloseKey.KERNELBASE(004630C0,?,?,0041A83B,WallpaperStyle,004630C0), ref: 004121A1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCreateInfoParametersSystemValue
                                                                        • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                        • API String ID: 4127273184-3576401099
                                                                        • Opcode ID: b8e930e406a51c142911afe7d42b80e3a9af200f2f362c56483f6d5d18d4ce76
                                                                        • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                                                        • Opcode Fuzzy Hash: b8e930e406a51c142911afe7d42b80e3a9af200f2f362c56483f6d5d18d4ce76
                                                                        • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 0044EF9A
                                                                        • _wcschr.LIBVCRUNTIME ref: 0044F02A
                                                                        • _wcschr.LIBVCRUNTIME ref: 0044F038
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,?,00000000,?), ref: 0044F0DB
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                        • String ID:
                                                                        • API String ID: 4212172061-0
                                                                        • Opcode ID: b042c09d22adbd0a465f75c66fe4c588d2498b30252692f7cd71b119f9e6cb68
                                                                        • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                                                                        • Opcode Fuzzy Hash: b042c09d22adbd0a465f75c66fe4c588d2498b30252692f7cd71b119f9e6cb68
                                                                        • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                                                                        APIs
                                                                        • _free.LIBCMT ref: 004468EC
                                                                          • Part of subcall function 00443C92: RtlFreeHeap.NTDLL(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                          • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                        • GetTimeZoneInformation.KERNEL32 ref: 004468FE
                                                                        • WideCharToMultiByte.KERNEL32(00000000,?,0046F754,000000FF,?,0000003F,?,?), ref: 00446976
                                                                        • WideCharToMultiByte.KERNEL32(00000000,?,0046F7A8,000000FF,?,0000003F,?,?,?,0046F754,000000FF,?,0000003F,?,?), ref: 004469A3
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                        • String ID:
                                                                        • API String ID: 806657224-0
                                                                        • Opcode ID: c4754ecadf84a16d93ca9149c5e3776e61e7a877748ed8df02352f8ef7aba337
                                                                        • Instruction ID: 2b7d8a9ac893eb444b3138181a21c3719d458e34cf104297cae44ef8c21a1482
                                                                        • Opcode Fuzzy Hash: c4754ecadf84a16d93ca9149c5e3776e61e7a877748ed8df02352f8ef7aba337
                                                                        • Instruction Fuzzy Hash: 4F31A5B1904245EFDB11DF69DC80469BBB8FF0671171602BFE090972A1D7B49D04DB5A
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F2F7
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F348
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F408
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorInfoLastLocale$_free$_abort
                                                                        • String ID:
                                                                        • API String ID: 2829624132-0
                                                                        • Opcode ID: c08902af5a4ebae337e65d4f4913ac80c8ce7fcb5dd297238357898b4052817f
                                                                        • Instruction ID: 12c224c4da0c85949021a4ccaa6d586ab513ef91610cb16151a2099a543b2454
                                                                        • Opcode Fuzzy Hash: c08902af5a4ebae337e65d4f4913ac80c8ce7fcb5dd297238357898b4052817f
                                                                        • Instruction Fuzzy Hash: 49617D71600207ABEB289F25CC82B7B77A8EF14314F1041BBED06C6685EB78D949DB58
                                                                        APIs
                                                                        • IsDebuggerPresent.KERNEL32 ref: 004399A4
                                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                        • String ID:
                                                                        • API String ID: 3906539128-0
                                                                        • Opcode ID: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                        • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                                                                        • Opcode Fuzzy Hash: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                        • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32(?,?,0044078B,?), ref: 004407D6
                                                                        • TerminateProcess.KERNEL32(00000000,?,0044078B,?), ref: 004407DD
                                                                        • ExitProcess.KERNEL32 ref: 004407EF
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                        • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                                                                        • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                        • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                                                                        APIs
                                                                        • OpenClipboard.USER32(00000000), ref: 0040A65D
                                                                        • GetClipboardData.USER32(0000000D), ref: 0040A669
                                                                        • CloseClipboard.USER32 ref: 0040A671
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Clipboard$CloseDataOpen
                                                                        • String ID:
                                                                        • API String ID: 2058664381-0
                                                                        • Opcode ID: fc42fbe939e34f95e3da0c1deb258c5860a889e64c116dd0334dc6fce6b72752
                                                                        • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                                                                        • Opcode Fuzzy Hash: fc42fbe939e34f95e3da0c1deb258c5860a889e64c116dd0334dc6fce6b72752
                                                                        • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor
                                                                        • String ID: P@
                                                                        • API String ID: 2325560087-676759640
                                                                        • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                                                        • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                                                                        • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                                                        • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                                                                        APIs
                                                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,004419DC,?,00000004), ref: 00445E6F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: InfoLocale
                                                                        • String ID: GetLocaleInfoEx
                                                                        • API String ID: 2299586839-2904428671
                                                                        • Opcode ID: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                                                        • Instruction ID: a9bb3d2992a9d1fe8e60343c55b6d981a628f421e7cf107d295b861f9edee2c3
                                                                        • Opcode Fuzzy Hash: f9893d92672fa9c5b6d787f9f7f2d4c4b9fbd30947df5498ead6f72c32f4f3f0
                                                                        • Instruction Fuzzy Hash: 6DF0F631600708BBDF016F619C05F6E7B51EB14721F10401BFC051A253CA758D109A9D
                                                                        APIs
                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004068E8
                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 004069B0
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FileFind$FirstNextsend
                                                                        • String ID:
                                                                        • API String ID: 4113138495-0
                                                                        • Opcode ID: 524338967388813fc8de9abe5b724c15e3da4b0921d1e3068b839a4adec35387
                                                                        • Instruction ID: f886cb8170a1cbefaa312452e39d18d6cd017e90ab843946bfd6f4b2f28fefe7
                                                                        • Opcode Fuzzy Hash: 524338967388813fc8de9abe5b724c15e3da4b0921d1e3068b839a4adec35387
                                                                        • Instruction Fuzzy Hash: 9C218F711043015BC314FBA1DC96CEFB7ACAF91358F400A3EF596621E1EF389A09CA5A
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0044F547
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$_free$InfoLocale_abort
                                                                        • String ID:
                                                                        • API String ID: 1663032902-0
                                                                        • Opcode ID: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                                                        • Instruction ID: 815750de5804ab4a8f75770bcc990d44dba9c2967eca50803adc2dd3443e40da
                                                                        • Opcode Fuzzy Hash: ad0e0b7788e936bcfdd9e0a2c8ea1aecabb77b710f5984c66624a7eb150c0fcd
                                                                        • Instruction Fuzzy Hash: 6421B372901206BBEF249F26DC45A7A73A8EB04315F10017BFD01C6242EB78AD59CB59
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                        • EnumSystemLocalesW.KERNEL32(0044F2A3,00000001), ref: 0044F1ED
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                        • String ID:
                                                                        • API String ID: 1084509184-0
                                                                        • Opcode ID: 673455fbabca7124b3ca300a5bad4779d617d2069552d52611791679d418f519
                                                                        • Instruction ID: fc4c71b657a69648ba6c32e8c27400de65702582941300ca2eca7bc8fd592fd6
                                                                        • Opcode Fuzzy Hash: 673455fbabca7124b3ca300a5bad4779d617d2069552d52611791679d418f519
                                                                        • Instruction Fuzzy Hash: D811293B6007019FEB189F39D89167BBB91FF80358B14443DE94647B40D776A946C744
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0044F4C1,00000000,00000000,?), ref: 0044F74F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$InfoLocale_abort_free
                                                                        • String ID:
                                                                        • API String ID: 2692324296-0
                                                                        • Opcode ID: e8e40a4c1e4a1452f322ea5d58aa65e712e874c7af3971ed527245fc130c3ff5
                                                                        • Instruction ID: e4b95bc4a5e1061338a04706472302caa06a68982d3ebb8569a44a178f9f49d5
                                                                        • Opcode Fuzzy Hash: e8e40a4c1e4a1452f322ea5d58aa65e712e874c7af3971ed527245fc130c3ff5
                                                                        • Instruction Fuzzy Hash: 09F02D36600516BBFB245B65DC05BBB7768EF40764F05447AEC19A3240EA7CFD05C6D4
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                        • EnumSystemLocalesW.KERNEL32(0044F4F3,00000001), ref: 0044F262
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                        • String ID:
                                                                        • API String ID: 1084509184-0
                                                                        • Opcode ID: e9707e75e047b008c80f6bc881a45fe398cc0546891e27ca4c894483a9e1b79d
                                                                        • Instruction ID: 7c38563944de2097393583401858843e6c2e12a799e64e453201a09b71e8bce8
                                                                        • Opcode Fuzzy Hash: e9707e75e047b008c80f6bc881a45fe398cc0546891e27ca4c894483a9e1b79d
                                                                        • Instruction Fuzzy Hash: 44F0223A2007045FEB145F399881A7B7B94FF8036CB15447EF9458B690DAB6AC068614
                                                                        APIs
                                                                          • Part of subcall function 00442D9A: EnterCriticalSection.KERNEL32(-0006A42D,?,004404DB,00000000,0046B4D8,0000000C,00440496,?,?,?,00443038,?,?,004457DA,00000001,00000364), ref: 00442DA9
                                                                        • EnumSystemLocalesW.KERNEL32(Function_000458CE,00000001,0046B680,0000000C), ref: 0044594C
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                        • String ID:
                                                                        • API String ID: 1272433827-0
                                                                        • Opcode ID: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                                                        • Instruction ID: 57fcd2d1ba6fdacad71b84952267562ddc6b8062f8818d57533dd41bf3368d71
                                                                        • Opcode Fuzzy Hash: 9f071f7aa8f2d5cfdb4dd86670e259d2fa7dae68b4529c3cbc217272811744e5
                                                                        • Instruction Fuzzy Hash: CFF03C72A10700EFEB00EF69D846B5D77F0EB08325F10402AF400DB2A2DAB989448B5E
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                        • EnumSystemLocalesW.KERNEL32(0044F087,00000001), ref: 0044F167
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                        • String ID:
                                                                        • API String ID: 1084509184-0
                                                                        • Opcode ID: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                                                        • Instruction ID: 407cbbfb1d6a14fdc0c4ba4a8479f65f1c0a46e2fba7f2f7bc53bc9e3406d240
                                                                        • Opcode Fuzzy Hash: 27fc750af04bae75093f47f6c8e3f33632e5f31a47d704513601fd173c54c35f
                                                                        • Instruction Fuzzy Hash: 22F05C3930020597DB049F35D845A7ABFA0EFC1754F060069EA058B651C6359C46C754
                                                                        APIs
                                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled
                                                                        • String ID:
                                                                        • API String ID: 3192549508-0
                                                                        • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                        • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                                                                        • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                        • Instruction Fuzzy Hash:
                                                                        APIs
                                                                        • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                                                                          • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                                                                        • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                                                                        • DeleteDC.GDI32(00000000), ref: 00416F32
                                                                        • DeleteDC.GDI32(00000000), ref: 00416F35
                                                                        • DeleteObject.GDI32(00000000), ref: 00416F38
                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                                                                        • DeleteDC.GDI32(00000000), ref: 00416F6A
                                                                        • DeleteDC.GDI32(00000000), ref: 00416F6D
                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                                                                        • GetIconInfo.USER32(?,?), ref: 00416FC5
                                                                        • DeleteObject.GDI32(?), ref: 00416FF4
                                                                        • DeleteObject.GDI32(?), ref: 00417001
                                                                        • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                                                                        • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                                                                        • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                                                                        • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                                                                        • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                                                                        • DeleteDC.GDI32(?), ref: 0041713C
                                                                        • DeleteDC.GDI32(00000000), ref: 0041713F
                                                                        • DeleteObject.GDI32(00000000), ref: 00417142
                                                                        • GlobalFree.KERNEL32(?), ref: 0041714D
                                                                        • DeleteObject.GDI32(00000000), ref: 00417201
                                                                        • GlobalFree.KERNEL32(?), ref: 00417208
                                                                        • DeleteDC.GDI32(?), ref: 00417218
                                                                        • DeleteDC.GDI32(00000000), ref: 00417223
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                        • String ID: DISPLAY
                                                                        • API String ID: 479521175-865373369
                                                                        • Opcode ID: f4872e5e54956cb8a82cf9cfbe48a4ffd8cadd88bec2254309271a8e236c435d
                                                                        • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                                                                        • Opcode Fuzzy Hash: f4872e5e54956cb8a82cf9cfbe48a4ffd8cadd88bec2254309271a8e236c435d
                                                                        • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                                                                        • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                                                                        • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                                                                        • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                                                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                                                                        • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                                                        • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                                                        • ResumeThread.KERNEL32(?), ref: 00416773
                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                                                                        • GetCurrentProcess.KERNEL32(?), ref: 00416795
                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                                                                        • GetLastError.KERNEL32 ref: 004167B8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                        • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                        • API String ID: 4188446516-3035715614
                                                                        • Opcode ID: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                                                        • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                                                        • Opcode Fuzzy Hash: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                                                        • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                                                                        APIs
                                                                          • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                          • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                                                                        • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                                                                          • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                                                          • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                                                          • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                                                          • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                                                                        • ExitProcess.KERNEL32 ref: 0040C389
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                        • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                                                                        • API String ID: 1861856835-1953526029
                                                                        • Opcode ID: 17bf4595bb140aab77195462eb014437854c4eecf7b0a70f93fa7bcd7137ec3b
                                                                        • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                                                                        • Opcode Fuzzy Hash: 17bf4595bb140aab77195462eb014437854c4eecf7b0a70f93fa7bcd7137ec3b
                                                                        • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                                                                        APIs
                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                                                                        • ExitProcess.KERNEL32(00000000), ref: 00410F05
                                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                                                                        • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                                                                        • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                                                                        • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                                                                          • Part of subcall function 0041A17B: CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                                                                        • Sleep.KERNEL32(000001F4), ref: 004110E7
                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041110E
                                                                        • GetCurrentProcessId.KERNEL32 ref: 00411114
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                        • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                                                                        • API String ID: 2649220323-71629269
                                                                        • Opcode ID: 22e3788b7de882572e50802ce453d65e547420d61471c8ff51f656e06725a515
                                                                        • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                                                                        • Opcode Fuzzy Hash: 22e3788b7de882572e50802ce453d65e547420d61471c8ff51f656e06725a515
                                                                        • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                                                                        APIs
                                                                        • _wcslen.LIBCMT ref: 0040B882
                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                                                        • _wcslen.LIBCMT ref: 0040B968
                                                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe,00000000,00000000,00000000), ref: 0040B9E0
                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                                                        • _wcslen.LIBCMT ref: 0040BA25
                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                                                        • ExitProcess.KERNEL32 ref: 0040BC36
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                                                        • String ID: """, 0$6$C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$!G$!G
                                                                        • API String ID: 2743683619-3516017847
                                                                        • Opcode ID: b06e7faee33cfaed22f51d7ac950c7a3f3444e9db8dd9e707e9954185f774f82
                                                                        • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                                                        • Opcode Fuzzy Hash: b06e7faee33cfaed22f51d7ac950c7a3f3444e9db8dd9e707e9954185f774f82
                                                                        • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                                                                        APIs
                                                                          • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                          • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BD63
                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDA6
                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDB5
                                                                          • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                                                          • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                                                          • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                                                          • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                                                                        • ExitProcess.KERNEL32 ref: 0040BFD7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                        • String ID: ")$.vbs$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                        • API String ID: 3797177996-2974882535
                                                                        • Opcode ID: 57f400eadd3448128050d7ad5fde5ac9df0c8dc2d43d0d2f55a1038c72fb190f
                                                                        • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                                                                        • Opcode Fuzzy Hash: 57f400eadd3448128050d7ad5fde5ac9df0c8dc2d43d0d2f55a1038c72fb190f
                                                                        • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                                                                        APIs
                                                                        • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                                                                        • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                                                                        • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                                                                        • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                                                                        • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                                                                        • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                                                                        • SetEvent.KERNEL32 ref: 004191CF
                                                                        • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                                                                        • CloseHandle.KERNEL32 ref: 004191F0
                                                                        • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                                                                        • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                        • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                                                        • API String ID: 738084811-1354618412
                                                                        • Opcode ID: d9c8abc686de1a07796c64aef86d2b04a1096a5fb4ab0ac7d3907c1f8c23837c
                                                                        • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                                                                        • Opcode Fuzzy Hash: d9c8abc686de1a07796c64aef86d2b04a1096a5fb4ab0ac7d3907c1f8c23837c
                                                                        • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                                                                        APIs
                                                                        • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                                                        • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                                                        • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                                                        • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                                                        • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                                                        • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                                                        • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                                                        • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                                                        • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                                                        • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$Write$Create
                                                                        • String ID: RIFF$WAVE$data$fmt
                                                                        • API String ID: 1602526932-4212202414
                                                                        • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                                                        • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                                                        • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                                                        • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$EnvironmentVariable$_wcschr
                                                                        • String ID:
                                                                        • API String ID: 3899193279-0
                                                                        • Opcode ID: 7152c14c9f043405eb9b9a37d5c5f1e16380f97c3d25ee63cda43d2d9904c190
                                                                        • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                                                        • Opcode Fuzzy Hash: 7152c14c9f043405eb9b9a37d5c5f1e16380f97c3d25ee63cda43d2d9904c190
                                                                        • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                                                        APIs
                                                                        • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                                                          • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                                                        • _free.LIBCMT ref: 0044E4DF
                                                                          • Part of subcall function 00443C92: RtlFreeHeap.NTDLL(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                          • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                        • _free.LIBCMT ref: 0044E501
                                                                        • _free.LIBCMT ref: 0044E516
                                                                        • _free.LIBCMT ref: 0044E521
                                                                        • _free.LIBCMT ref: 0044E543
                                                                        • _free.LIBCMT ref: 0044E556
                                                                        • _free.LIBCMT ref: 0044E564
                                                                        • _free.LIBCMT ref: 0044E56F
                                                                        • _free.LIBCMT ref: 0044E5A7
                                                                        • _free.LIBCMT ref: 0044E5AE
                                                                        • _free.LIBCMT ref: 0044E5CB
                                                                        • _free.LIBCMT ref: 0044E5E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                        • String ID: pF
                                                                        • API String ID: 161543041-2973420481
                                                                        • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                                                        • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                                                        • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                                                        • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                                                        APIs
                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                                                        • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                                                        • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                                                        • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                                                        • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                        • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                        • API String ID: 2490988753-744132762
                                                                        • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                        • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                                                        • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                        • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                                                        APIs
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                                                          • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                          • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                                                          • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                                                        • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                                                        • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                                                        • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                                                        • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                                                        • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                                                        • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                                                        • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                                                        • Sleep.KERNEL32(00000064), ref: 00411C63
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                        • String ID: /stext "$$.F$@#G$@#G
                                                                        • API String ID: 1223786279-2596709126
                                                                        • Opcode ID: 48213fd4d5abe4fd85ef6aaa4562a37235d89d768066aed7768bf367896ddbbb
                                                                        • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                                                        • Opcode Fuzzy Hash: 48213fd4d5abe4fd85ef6aaa4562a37235d89d768066aed7768bf367896ddbbb
                                                                        • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free
                                                                        • String ID: pF
                                                                        • API String ID: 269201875-2973420481
                                                                        • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                        • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                                                        • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                        • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                                                        APIs
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                                                                          • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                                                                        • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                                                                        • String ID: 0"G$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$!G
                                                                        • API String ID: 193334293-3226144251
                                                                        • Opcode ID: 512e7aa64a29e630e753ed5142c57c007a33ad23a2ac30d04bdc22c2bdcd0654
                                                                        • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                                                                        • Opcode Fuzzy Hash: 512e7aa64a29e630e753ed5142c57c007a33ad23a2ac30d04bdc22c2bdcd0654
                                                                        • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                                                                        APIs
                                                                        • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                                                        • GetCursorPos.USER32(?), ref: 0041B39E
                                                                        • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                                                        • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                                                        • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                                                        • ExitProcess.KERNEL32 ref: 0041B41A
                                                                        • CreatePopupMenu.USER32 ref: 0041B420
                                                                        • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                        • String ID: Close
                                                                        • API String ID: 1657328048-3535843008
                                                                        • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                                                        • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                                                        • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                                                        • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$Info
                                                                        • String ID:
                                                                        • API String ID: 2509303402-0
                                                                        • Opcode ID: 5e18815deab3af0a554b22f0f513d99250dc0897ca86d475d531c9af84244740
                                                                        • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                                                        • Opcode Fuzzy Hash: 5e18815deab3af0a554b22f0f513d99250dc0897ca86d475d531c9af84244740
                                                                        • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                                                        APIs
                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                                                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                                                                        • __aulldiv.LIBCMT ref: 00407D89
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                                                                        • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                                                                        • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408038
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                        • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                                                        • API String ID: 3086580692-2596673759
                                                                        • Opcode ID: e294c69aea2f9896a26e80ba208023c2e52adf2670876ef97f8c5d22051058c8
                                                                        • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                                                                        • Opcode Fuzzy Hash: e294c69aea2f9896a26e80ba208023c2e52adf2670876ef97f8c5d22051058c8
                                                                        • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                                                                        APIs
                                                                        • RegEnumKeyExA.ADVAPI32 ref: 0041A47F
                                                                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,00020019,?), ref: 0041A4B0
                                                                        • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseEnumOpen
                                                                        • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$UninstallString
                                                                        • API String ID: 1332880857-3730529168
                                                                        • Opcode ID: 4d6256ca6c3ac919f3f8d4cba605b6823c2372603dcb2b171f06ea34bc636a85
                                                                        • Instruction ID: 4431336161eaad6e2d2aa402c01db4654b3b7c935e82bf046b55a61e03329e01
                                                                        • Opcode Fuzzy Hash: 4d6256ca6c3ac919f3f8d4cba605b6823c2372603dcb2b171f06ea34bc636a85
                                                                        • Instruction Fuzzy Hash: 966132311182419BC328EB51D891EEFB3E8EF94348F50493FF586921E2EF749949CA5A
                                                                        APIs
                                                                          • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                          • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                          • Part of subcall function 004120E8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                          • Part of subcall function 004120E8: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                          • Part of subcall function 004120E8: RegCloseKey.KERNELBASE(00000000), ref: 00412128
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                                                        • ExitProcess.KERNEL32 ref: 0040C57D
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                        • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                                                                        • API String ID: 1913171305-2600661426
                                                                        • Opcode ID: ec7b6c5aa71812b8a2a0985082f26332d579f65edb8dcc3be96a361ae3ddec7d
                                                                        • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                                                        • Opcode Fuzzy Hash: ec7b6c5aa71812b8a2a0985082f26332d579f65edb8dcc3be96a361ae3ddec7d
                                                                        • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                                                        APIs
                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                                                        • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                                                        • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                                                        • closesocket.WS2_32(000000FF), ref: 00404E3A
                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E71
                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404E82
                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404E89
                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9F
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EA4
                                                                        • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB1
                                                                        • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB6
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                        • String ID:
                                                                        • API String ID: 3658366068-0
                                                                        • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                                                        • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                                                                        • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                                                        • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: 65535$udp
                                                                        • API String ID: 0-1267037602
                                                                        • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                                                        • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                                                        • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                                                        • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                                                        • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                                                        • __dosmaperr.LIBCMT ref: 00438646
                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                                                        • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                                                        • __dosmaperr.LIBCMT ref: 00438683
                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                                                        • __dosmaperr.LIBCMT ref: 004386D7
                                                                        • _free.LIBCMT ref: 004386E3
                                                                        • _free.LIBCMT ref: 004386EA
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                        • String ID:
                                                                        • API String ID: 2441525078-0
                                                                        • Opcode ID: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                                                                        • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                                                        • Opcode Fuzzy Hash: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                                                                        • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free
                                                                        • String ID: pF$tF
                                                                        • API String ID: 269201875-2954683558
                                                                        • Opcode ID: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                                                                        • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                                                                        • Opcode Fuzzy Hash: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                                                                        • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                                                                        APIs
                                                                        • SetEvent.KERNEL32(?,?), ref: 0040549F
                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                                                        • TranslateMessage.USER32(?), ref: 0040555E
                                                                        • DispatchMessageA.USER32(?), ref: 00405569
                                                                        • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                                                        • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                        • String ID: CloseChat$DisplayMessage$GetMessage
                                                                        • API String ID: 2956720200-749203953
                                                                        • Opcode ID: 5aaade3501df1f705845f0b5dcc57d3d772cc4ef9fb25b6a23c271cf745af6d5
                                                                        • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                                                        • Opcode Fuzzy Hash: 5aaade3501df1f705845f0b5dcc57d3d772cc4ef9fb25b6a23c271cf745af6d5
                                                                        • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                                                        APIs
                                                                          • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00416123
                                                                        • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                                                        • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                        • String ID: <$@$@%G$@%G$Temp
                                                                        • API String ID: 1704390241-4139030828
                                                                        • Opcode ID: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                                                        • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                                                        • Opcode Fuzzy Hash: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                                                        • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                                                        APIs
                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                                                        • ExitProcess.KERNEL32 ref: 00406782
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExecuteExitProcessShell
                                                                        • String ID: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                                                        • API String ID: 1124553745-940923660
                                                                        • Opcode ID: ff3164ff437bd938bf0af4aa1d69ac47d2773793f706654e7af8f8ab839ecf43
                                                                        • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                                                        • Opcode Fuzzy Hash: ff3164ff437bd938bf0af4aa1d69ac47d2773793f706654e7af8f8ab839ecf43
                                                                        • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                                                        APIs
                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                        • String ID:
                                                                        • API String ID: 221034970-0
                                                                        • Opcode ID: 5ca2c9f4f824d20fd2b15ead523db82676a1b8751022075e59f45b476e20e695
                                                                        • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                                                        • Opcode Fuzzy Hash: 5ca2c9f4f824d20fd2b15ead523db82676a1b8751022075e59f45b476e20e695
                                                                        • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                                                        APIs
                                                                        • _free.LIBCMT ref: 00445645
                                                                          • Part of subcall function 00443C92: RtlFreeHeap.NTDLL(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                          • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                        • _free.LIBCMT ref: 00445651
                                                                        • _free.LIBCMT ref: 0044565C
                                                                        • _free.LIBCMT ref: 00445667
                                                                        • _free.LIBCMT ref: 00445672
                                                                        • _free.LIBCMT ref: 0044567D
                                                                        • _free.LIBCMT ref: 00445688
                                                                        • _free.LIBCMT ref: 00445693
                                                                        • _free.LIBCMT ref: 0044569E
                                                                        • _free.LIBCMT ref: 004456AC
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                                                        • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                                                        • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                                                        • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                                                        APIs
                                                                        • __EH_prolog.LIBCMT ref: 00417F6F
                                                                        • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                                                                        • Sleep.KERNEL32(000003E8), ref: 004180B3
                                                                        • GetLocalTime.KERNEL32(?), ref: 004180BB
                                                                        • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                        • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                        • API String ID: 489098229-3790400642
                                                                        • Opcode ID: d986c0086e082f31797726373313937d89721add50fb1544cc2274eb4558e2a5
                                                                        • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                                                                        • Opcode Fuzzy Hash: d986c0086e082f31797726373313937d89721add50fb1544cc2274eb4558e2a5
                                                                        • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                                                                        APIs
                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,004541DF), ref: 00453107
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DecodePointer
                                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                        • API String ID: 3527080286-3064271455
                                                                        • Opcode ID: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                                                        • Instruction ID: 9333e61b372fbf41addd7e909d3efe481a8fa84217f9852f3907f1ba123c2b47
                                                                        • Opcode Fuzzy Hash: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                                                        • Instruction Fuzzy Hash: CC518F30900909DBCF10DFA8E9480ADBBB0FF0A347F644196EC81A7216CB799A1DDB1D
                                                                        APIs
                                                                        • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                                                          • Part of subcall function 0041A20F: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                        • Sleep.KERNEL32(00000064), ref: 00415A46
                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CreateDeleteExecuteShellSleep
                                                                        • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                        • API String ID: 1462127192-2001430897
                                                                        • Opcode ID: 430b105faeda767b46b4a098234c7ea381730a777681d078a01f98d4ea25ab71
                                                                        • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                                                        • Opcode Fuzzy Hash: 430b105faeda767b46b4a098234c7ea381730a777681d078a01f98d4ea25ab71
                                                                        • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                                                        APIs
                                                                        • AllocConsole.KERNEL32(00000000), ref: 0041AA5D
                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AllocConsoleShowWindow
                                                                        • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                                                        • API String ID: 4118500197-4025029772
                                                                        • Opcode ID: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                                                        • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                                                        • Opcode Fuzzy Hash: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                                                        • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                                                        APIs
                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                                                          • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                                                          • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                                                          • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                                                        • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                                                        • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                                                        • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                                                        • TranslateMessage.USER32(?), ref: 0041B29E
                                                                        • DispatchMessageA.USER32(?), ref: 0041B2A8
                                                                        • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                        • String ID: Remcos
                                                                        • API String ID: 1970332568-165870891
                                                                        • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                                                        • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                                                        • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                                                        • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                                                                        • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                                                                        • Opcode Fuzzy Hash: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                                                                        • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                                                                        APIs
                                                                          • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                                                                        • __dosmaperr.LIBCMT ref: 00452ED6
                                                                        • GetFileType.KERNEL32(00000000), ref: 00452EE2
                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                                                                        • __dosmaperr.LIBCMT ref: 00452EF5
                                                                        • CloseHandle.KERNEL32(00000000), ref: 00452F15
                                                                        • CloseHandle.KERNEL32(00000000), ref: 0045305F
                                                                        • GetLastError.KERNEL32 ref: 00453091
                                                                        • __dosmaperr.LIBCMT ref: 00453098
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                        • String ID:
                                                                        • API String ID: 4237864984-0
                                                                        • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                                                        • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                                                                        • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                                                        • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                                                                        APIs
                                                                        • GetCPInfo.KERNEL32(?,?), ref: 0045100F
                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00451092
                                                                        • __alloca_probe_16.LIBCMT ref: 004510CA
                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00451125
                                                                        • __alloca_probe_16.LIBCMT ref: 00451174
                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0045113C
                                                                          • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004511B8
                                                                        • __freea.LIBCMT ref: 004511E3
                                                                        • __freea.LIBCMT ref: 004511EF
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                        • String ID:
                                                                        • API String ID: 201697637-0
                                                                        • Opcode ID: 99543cff2907c0b4d34c425deaa11b1fb650b3a063013b5d40be1c299c57468c
                                                                        • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                                                                        • Opcode Fuzzy Hash: 99543cff2907c0b4d34c425deaa11b1fb650b3a063013b5d40be1c299c57468c
                                                                        • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                                                                        APIs
                                                                          • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                          • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                          • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                          • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                        • _memcmp.LIBVCRUNTIME ref: 00442935
                                                                        • _free.LIBCMT ref: 004429A6
                                                                        • _free.LIBCMT ref: 004429BF
                                                                        • _free.LIBCMT ref: 004429F1
                                                                        • _free.LIBCMT ref: 004429FA
                                                                        • _free.LIBCMT ref: 00442A06
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$ErrorLast$_abort_memcmp
                                                                        • String ID: C
                                                                        • API String ID: 1679612858-1037565863
                                                                        • Opcode ID: 7566827e2ed3776f8e8568dfe657035855bda713ddddf546254e360ae98071d6
                                                                        • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                                                        • Opcode Fuzzy Hash: 7566827e2ed3776f8e8568dfe657035855bda713ddddf546254e360ae98071d6
                                                                        • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: tcp$udp
                                                                        • API String ID: 0-3725065008
                                                                        • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                                                        • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                                                        • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                                                        • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Eventinet_ntoa
                                                                        • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                                        • API String ID: 3578746661-168337528
                                                                        • Opcode ID: bd8155a0b863425f3f5ac9b2c89ecec1372079f1cfce198561ff7c343b1749f4
                                                                        • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                                                                        • Opcode Fuzzy Hash: bd8155a0b863425f3f5ac9b2c89ecec1372079f1cfce198561ff7c343b1749f4
                                                                        • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                                                                        APIs
                                                                        • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                                                        • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                                                        • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                                                        • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                                                          • Part of subcall function 00404B76: WaitForSingleObject.KERNEL32(?,000000FF,?,00471E90,00404C29,00000000,?,?,?,00471E90,?), ref: 00404B85
                                                                          • Part of subcall function 00404B76: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040546B), ref: 00404BA3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                        • String ID: .part
                                                                        • API String ID: 1303771098-3499674018
                                                                        • Opcode ID: 902e130b94aad18369189187a8e6e7e21762ac87eb431447f7a89350bc37b519
                                                                        • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                                                        • Opcode Fuzzy Hash: 902e130b94aad18369189187a8e6e7e21762ac87eb431447f7a89350bc37b519
                                                                        • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                                                                        • __alloca_probe_16.LIBCMT ref: 00447056
                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                                                                        • __alloca_probe_16.LIBCMT ref: 0044713B
                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                                                                        • __freea.LIBCMT ref: 004471AB
                                                                          • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        • __freea.LIBCMT ref: 004471B4
                                                                        • __freea.LIBCMT ref: 004471D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 3864826663-0
                                                                        • Opcode ID: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                                                                        • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                                                                        • Opcode Fuzzy Hash: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                                                                        • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                                                                        APIs
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                                                        • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: InputSend
                                                                        • String ID:
                                                                        • API String ID: 3431551938-0
                                                                        • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                                                        • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                                                        • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                                                        • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                                                        APIs
                                                                        • OpenClipboard.USER32 ref: 00414F41
                                                                        • EmptyClipboard.USER32 ref: 00414F4F
                                                                        • CloseClipboard.USER32 ref: 00414F55
                                                                        • OpenClipboard.USER32 ref: 00414F5C
                                                                        • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                                                        • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                                                        • CloseClipboard.USER32 ref: 00414F84
                                                                          • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                        • String ID:
                                                                        • API String ID: 2172192267-0
                                                                        • Opcode ID: 1de530116997ba81a090b82115ea5616da963aeca7a52e6e9a7f8e655297098a
                                                                        • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                                                                        • Opcode Fuzzy Hash: 1de530116997ba81a090b82115ea5616da963aeca7a52e6e9a7f8e655297098a
                                                                        • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                                                                        APIs
                                                                        • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                                                        • __fassign.LIBCMT ref: 00447814
                                                                        • __fassign.LIBCMT ref: 0044782F
                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                                                        • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                                                        • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                        • String ID:
                                                                        • API String ID: 1324828854-0
                                                                        • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                                                        • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                                                        • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                                                        • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                                                        APIs
                                                                        • _strftime.LIBCMT ref: 00401D30
                                                                          • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                                                        • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                                                                        • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                                                                        • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                        • String ID: %Y-%m-%d %H.%M$.wav
                                                                        • API String ID: 3809562944-3597965672
                                                                        • Opcode ID: d9f53293eee377a4641faa8542e573edd33862d918c1b44ecd9bf446bc1b64af
                                                                        • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                                                                        • Opcode Fuzzy Hash: d9f53293eee377a4641faa8542e573edd33862d918c1b44ecd9bf446bc1b64af
                                                                        • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                                                                        APIs
                                                                          • Part of subcall function 00411F91: RegOpenKeyExA.KERNELBASE(80000002,00000400,00000000,00020019,00000000,00000000,00000000), ref: 00411FB5
                                                                          • Part of subcall function 00411F91: RegQueryValueExA.KERNELBASE(00000000,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                          • Part of subcall function 00411F91: RegCloseKey.KERNELBASE(00000000), ref: 00411FDD
                                                                        • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                                                                        • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                        • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                        • API String ID: 1133728706-4073444585
                                                                        • Opcode ID: b203dc2bf87086d66bf72b334b1ed1fd5e5a8ad1a1e44632c740ce92ce1b61e8
                                                                        • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                                                                        • Opcode Fuzzy Hash: b203dc2bf87086d66bf72b334b1ed1fd5e5a8ad1a1e44632c740ce92ce1b61e8
                                                                        • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                                                                        • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                                                                        • Opcode Fuzzy Hash: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                                                                        • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                                                                        APIs
                                                                          • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                                                        • _free.LIBCMT ref: 0044E128
                                                                          • Part of subcall function 00443C92: RtlFreeHeap.NTDLL(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                          • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                        • _free.LIBCMT ref: 0044E133
                                                                        • _free.LIBCMT ref: 0044E13E
                                                                        • _free.LIBCMT ref: 0044E192
                                                                        • _free.LIBCMT ref: 0044E19D
                                                                        • _free.LIBCMT ref: 0044E1A8
                                                                        • _free.LIBCMT ref: 0044E1B3
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                                                        • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                                                        • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                                                        • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                                                        • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLastValue___vcrt_
                                                                        • String ID:
                                                                        • API String ID: 3852720340-0
                                                                        • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                                                        • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                                                        • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                                                        • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                                                        APIs
                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                                                        • GetLastError.KERNEL32 ref: 0040AA28
                                                                        Strings
                                                                        • [Chrome Cookies not found], xrefs: 0040AA42
                                                                        • UserProfile, xrefs: 0040A9EE
                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                                                        • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DeleteErrorFileLast
                                                                        • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                        • API String ID: 2018770650-304995407
                                                                        • Opcode ID: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                                                        • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                                                        • Opcode Fuzzy Hash: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                                                        • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                                                        APIs
                                                                        • __allrem.LIBCMT ref: 00438A09
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                                                        • __allrem.LIBCMT ref: 00438A3C
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                                                        • __allrem.LIBCMT ref: 00438A71
                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                        • String ID:
                                                                        • API String ID: 1992179935-0
                                                                        • Opcode ID: a5bb698a37765ca5ad947defe33ca2ea1dc364bfd829a3e03f22b831f39bfe5b
                                                                        • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                                                        • Opcode Fuzzy Hash: a5bb698a37765ca5ad947defe33ca2ea1dc364bfd829a3e03f22b831f39bfe5b
                                                                        • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: __cftoe
                                                                        • String ID:
                                                                        • API String ID: 4189289331-0
                                                                        • Opcode ID: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                                                                        • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                                                                        • Opcode Fuzzy Hash: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                                                                        • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: __freea$__alloca_probe_16_free
                                                                        • String ID: a/p$am/pm
                                                                        • API String ID: 2936374016-3206640213
                                                                        • Opcode ID: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                                                                        • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                                                        • Opcode Fuzzy Hash: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                                                                        • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                                                        APIs
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                                                        • int.LIBCPMT ref: 0040F8D7
                                                                          • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                                                          • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                                                        • std::_Facet_Register.LIBCPMT ref: 0040F917
                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                                                        • __Init_thread_footer.LIBCMT ref: 0040F97F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                        • String ID:
                                                                        • API String ID: 3815856325-0
                                                                        • Opcode ID: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                                                        • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                                                        • Opcode Fuzzy Hash: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                                                        • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                                                        APIs
                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                                                                        • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                        • String ID:
                                                                        • API String ID: 493672254-0
                                                                        • Opcode ID: e5fb97a0e042aa3cf5d98ae642475e55fc2ba561f34e835e136d8c0823c8ccc0
                                                                        • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                                                                        • Opcode Fuzzy Hash: e5fb97a0e042aa3cf5d98ae642475e55fc2ba561f34e835e136d8c0823c8ccc0
                                                                        • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                                                                        APIs
                                                                        • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                        • _free.LIBCMT ref: 0044575C
                                                                        • _free.LIBCMT ref: 00445784
                                                                        • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                        • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                        • _abort.LIBCMT ref: 004457A3
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$_free$_abort
                                                                        • String ID:
                                                                        • API String ID: 3160817290-0
                                                                        • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                        • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                                                        • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                        • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                                                        APIs
                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                        • String ID:
                                                                        • API String ID: 221034970-0
                                                                        • Opcode ID: 3bbd86ba799800cf7f8ce060c277169374427670bb2790cc1e4148a280c4ce89
                                                                        • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                                                        • Opcode Fuzzy Hash: 3bbd86ba799800cf7f8ce060c277169374427670bb2790cc1e4148a280c4ce89
                                                                        • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                                                        APIs
                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                                                                        • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                        • String ID:
                                                                        • API String ID: 221034970-0
                                                                        • Opcode ID: 51d638f86096adaa624434d30e6a89006adfc0cfe1ec13e8d912c26abb46eda1
                                                                        • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                                                                        • Opcode Fuzzy Hash: 51d638f86096adaa624434d30e6a89006adfc0cfe1ec13e8d912c26abb46eda1
                                                                        • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                                                                        APIs
                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                                                                        • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                        • String ID:
                                                                        • API String ID: 221034970-0
                                                                        • Opcode ID: 0684a22c1c03eddcd9e7afcbe452ed3b601dba84a8ad96751855c8c9c88a9e76
                                                                        • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                                                                        • Opcode Fuzzy Hash: 0684a22c1c03eddcd9e7afcbe452ed3b601dba84a8ad96751855c8c9c88a9e76
                                                                        • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                                                                        APIs
                                                                        • RegisterClassExA.USER32(00000030), ref: 0041B310
                                                                        • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                                                        • GetLastError.KERNEL32 ref: 0041B335
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ClassCreateErrorLastRegisterWindow
                                                                        • String ID: 0$MsgWindowClass
                                                                        • API String ID: 2877667751-2410386613
                                                                        • Opcode ID: 56902e7ce510076f74c8553bddfcc296c8b43bf8629b49d1abcba33967316c49
                                                                        • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                                                        • Opcode Fuzzy Hash: 56902e7ce510076f74c8553bddfcc296c8b43bf8629b49d1abcba33967316c49
                                                                        • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                                                        APIs
                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                                                          • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                                                        • _UnwindNestedFrames.LIBCMT ref: 00437631
                                                                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                        • String ID: /zC
                                                                        • API String ID: 2633735394-4132788633
                                                                        • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                        • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                                                        • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                        • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                                                        APIs
                                                                        • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                                                        • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                                                        • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                                                        • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: MetricsSystem
                                                                        • String ID: ]tA
                                                                        • API String ID: 4116985748-3517819141
                                                                        • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                                                        • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                                                        • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                                                        • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                                                        APIs
                                                                        • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                                                        Strings
                                                                        • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                                                        • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseHandle$CreateProcess
                                                                        • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                        • API String ID: 2922976086-4183131282
                                                                        • Opcode ID: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                                                        • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                                                        • Opcode Fuzzy Hash: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                                                        • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                                                                        APIs
                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                        • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                                                        • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                        • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                                                        APIs
                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        Strings
                                                                        • Connection KeepAlive | Disabled, xrefs: 004050D9
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                        • String ID: Connection KeepAlive | Disabled
                                                                        • API String ID: 2993684571-3818284553
                                                                        • Opcode ID: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                                                        • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                                                        • Opcode Fuzzy Hash: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                                                        • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                                                        APIs
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                                                                        • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                                                                        • Sleep.KERNEL32(00002710), ref: 00418DBD
                                                                        • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                        • String ID: Alarm triggered
                                                                        • API String ID: 614609389-2816303416
                                                                        • Opcode ID: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                                                        • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                                                                        • Opcode Fuzzy Hash: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                                                        • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                                                        • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                                                        • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                                                        • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                                                        APIs
                                                                        • Sleep.KERNEL32(00000000,0040BE20), ref: 004044A4
                                                                          • Part of subcall function 004045E7: __EH_prolog.LIBCMT ref: 004045EC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: H_prologSleep
                                                                        • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                                                        • API String ID: 3469354165-3547787478
                                                                        • Opcode ID: a3fa329fc701e4499877fe9f0d09753c98d8fb8df823c067a07162262539b5de
                                                                        • Instruction ID: 7794b0ea9bf29785644917a3a4e5658b539d561772896ef264e5995737b90c85
                                                                        • Opcode Fuzzy Hash: a3fa329fc701e4499877fe9f0d09753c98d8fb8df823c067a07162262539b5de
                                                                        • Instruction Fuzzy Hash: 5951E8B1B0420167C614BB769D5AA6E3795ABC0744F00053FFA45A77E2EF7C8D09C29E
                                                                        APIs
                                                                          • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        • _free.LIBCMT ref: 00442318
                                                                        • _free.LIBCMT ref: 0044232F
                                                                        • _free.LIBCMT ref: 0044234E
                                                                        • _free.LIBCMT ref: 00442369
                                                                        • _free.LIBCMT ref: 00442380
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$AllocateHeap
                                                                        • String ID:
                                                                        • API String ID: 3033488037-0
                                                                        • Opcode ID: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                                                                        • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                                                        • Opcode Fuzzy Hash: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                                                                        • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free
                                                                        • String ID:
                                                                        • API String ID: 269201875-0
                                                                        • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                                                        • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                                                        • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                                                        • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                                                                        • __alloca_probe_16.LIBCMT ref: 0044E391
                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                                                                        • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                                                                        • __freea.LIBCMT ref: 0044E3FD
                                                                          • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                        • String ID:
                                                                        • API String ID: 313313983-0
                                                                        • Opcode ID: b11d3600e2aa565fdc4ed9d3d5ae446cbeb211535541ee0462b0a0c8c7e06313
                                                                        • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                                                        • Opcode Fuzzy Hash: b11d3600e2aa565fdc4ed9d3d5ae446cbeb211535541ee0462b0a0c8c7e06313
                                                                        • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                                                        APIs
                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                                                                        • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                                                                        • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                                                                        • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                                                                        • waveInStart.WINMM ref: 00401CDE
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                        • String ID:
                                                                        • API String ID: 1356121797-0
                                                                        • Opcode ID: 83ba936013dc37cd0af0ea744be7f1114ca09fe95f3fbf4348052972e1372099
                                                                        • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                                                                        • Opcode Fuzzy Hash: 83ba936013dc37cd0af0ea744be7f1114ca09fe95f3fbf4348052972e1372099
                                                                        • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                                                          • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                                                        • _free.LIBCMT ref: 0044C59F
                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                        • String ID:
                                                                        • API String ID: 336800556-0
                                                                        • Opcode ID: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                                                                        • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                                                        • Opcode Fuzzy Hash: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                                                                        • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                                                        APIs
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                                                                        • int.LIBCPMT ref: 0040FBE8
                                                                          • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                                                          • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                                                        • std::_Facet_Register.LIBCPMT ref: 0040FC28
                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                        • String ID:
                                                                        • API String ID: 2536120697-0
                                                                        • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                                                        • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                                                                        • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                                                        • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                                                                        APIs
                                                                        • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                                                                        • _free.LIBCMT ref: 004457E3
                                                                        • _free.LIBCMT ref: 0044580A
                                                                        • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                                                                        • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLast$_free
                                                                        • String ID:
                                                                        • API String ID: 3170660625-0
                                                                        • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                        • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                                                        • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                        • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                                                                        APIs
                                                                        • _free.LIBCMT ref: 0044DBB4
                                                                          • Part of subcall function 00443C92: RtlFreeHeap.NTDLL(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                          • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                        • _free.LIBCMT ref: 0044DBC6
                                                                        • _free.LIBCMT ref: 0044DBD8
                                                                        • _free.LIBCMT ref: 0044DBEA
                                                                        • _free.LIBCMT ref: 0044DBFC
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                                                        • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                                                                        • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                                                        • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                                                                        APIs
                                                                        • _free.LIBCMT ref: 00441566
                                                                          • Part of subcall function 00443C92: RtlFreeHeap.NTDLL(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                          • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                        • _free.LIBCMT ref: 00441578
                                                                        • _free.LIBCMT ref: 0044158B
                                                                        • _free.LIBCMT ref: 0044159C
                                                                        • _free.LIBCMT ref: 004415AD
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 776569668-0
                                                                        • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                                                        • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                                                        • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                                                        • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                                                        APIs
                                                                        • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Enum$InfoQueryValue
                                                                        • String ID: [regsplt]
                                                                        • API String ID: 3554306468-4262303796
                                                                        • Opcode ID: 31596f5eeff4ff3231d9cf904b1bbbbbb7f3a84228b4d9aa491321f33c9aa201
                                                                        • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                                                        • Opcode Fuzzy Hash: 31596f5eeff4ff3231d9cf904b1bbbbbb7f3a84228b4d9aa491321f33c9aa201
                                                                        • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: __alloca_probe_16__freea
                                                                        • String ID: H"G$H"GH"G
                                                                        • API String ID: 1635606685-3036711414
                                                                        • Opcode ID: 54c5712f20b3b570914cef82e111ba4a5148cfaa71e7a23ac689d4b8bfc24f49
                                                                        • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                                                                        • Opcode Fuzzy Hash: 54c5712f20b3b570914cef82e111ba4a5148cfaa71e7a23ac689d4b8bfc24f49
                                                                        • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                                                                        APIs
                                                                        • __Init_thread_footer.LIBCMT ref: 0040189E
                                                                        • ExitThread.KERNEL32 ref: 004018D6
                                                                        • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                                                          • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                        • String ID: 8:G
                                                                        • API String ID: 1649129571-405301104
                                                                        • Opcode ID: 10dc60cb35ab61dcc6849e3b29841ec1f691037cf33c39428261ce72e9623d3a
                                                                        • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                                                        • Opcode Fuzzy Hash: 10dc60cb35ab61dcc6849e3b29841ec1f691037cf33c39428261ce72e9623d3a
                                                                        • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                                                        APIs
                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe,00000104), ref: 00440975
                                                                        • _free.LIBCMT ref: 00440A40
                                                                        • _free.LIBCMT ref: 00440A4A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free$FileModuleName
                                                                        • String ID: C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe
                                                                        • API String ID: 2506810119-1974807
                                                                        • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                        • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                                                        • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                        • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                                                        APIs
                                                                          • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                                                          • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                                                          • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                                                          • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                        • _wcslen.LIBCMT ref: 00419744
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                        • String ID: .exe$program files (x86)\$program files\
                                                                        • API String ID: 37874593-1203593143
                                                                        • Opcode ID: 1417c3b161e4306ff3f102890f87f473ccca3ae6b06841d4ebb46211cc06e180
                                                                        • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                                                        • Opcode Fuzzy Hash: 1417c3b161e4306ff3f102890f87f473ccca3ae6b06841d4ebb46211cc06e180
                                                                        • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                                                        APIs
                                                                        • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                        • wsprintfW.USER32 ref: 0040A13F
                                                                          • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: EventLocalTimewsprintf
                                                                        • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                        • API String ID: 1497725170-1359877963
                                                                        • Opcode ID: 6a175db15026a1287dec42609df76e712cf4963de752978ede030ed590b6a054
                                                                        • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                                                        • Opcode Fuzzy Hash: 6a175db15026a1287dec42609df76e712cf4963de752978ede030ed590b6a054
                                                                        • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                                                        APIs
                                                                          • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                          • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                                                                        • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CreateThread$LocalTime$wsprintf
                                                                        • String ID: Online Keylogger Started
                                                                        • API String ID: 112202259-1258561607
                                                                        • Opcode ID: 5fa459dc9ce629ff8a70036c08f5d98878fb93e531b8a2c19081d6b25492cc47
                                                                        • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                                                                        • Opcode Fuzzy Hash: 5fa459dc9ce629ff8a70036c08f5d98878fb93e531b8a2c19081d6b25492cc47
                                                                        • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?,00000000), ref: 00406090
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: CryptUnprotectData$crypt32
                                                                        • API String ID: 2574300362-2380590389
                                                                        • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                                                        • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                                                        • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                                                        • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                                                        APIs
                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                                                        • CloseHandle.KERNEL32(?), ref: 004051AA
                                                                        • SetEvent.KERNEL32(?), ref: 004051B9
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseEventHandleObjectSingleWait
                                                                        • String ID: Connection Timeout
                                                                        • API String ID: 2055531096-499159329
                                                                        • Opcode ID: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                                                        • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                                                        • Opcode Fuzzy Hash: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                                                        • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                                                        APIs
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Exception@8Throw
                                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                        • API String ID: 2005118841-1866435925
                                                                        • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                                                        • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                                                        • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                                                        • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                                                        APIs
                                                                        • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExecuteShell
                                                                        • String ID: /C $cmd.exe$open
                                                                        • API String ID: 587946157-3896048727
                                                                        • Opcode ID: 81b5345ad9d3db4d4994ac41449fb6ee697cad801085dd735002afe2716ac4b4
                                                                        • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                                                        • Opcode Fuzzy Hash: 81b5345ad9d3db4d4994ac41449fb6ee697cad801085dd735002afe2716ac4b4
                                                                        • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                                                        APIs
                                                                        • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                                                        Strings
                                                                        • http\shell\open\command, xrefs: 00412026
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseOpenQueryValue
                                                                        • String ID: http\shell\open\command
                                                                        • API String ID: 3677997916-1487954565
                                                                        • Opcode ID: 0e8278834a88dd125b5a4e0272649bf262eb2ce361776dde88d9fd2e8eebaada
                                                                        • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                                                        • Opcode Fuzzy Hash: 0e8278834a88dd125b5a4e0272649bf262eb2ce361776dde88d9fd2e8eebaada
                                                                        • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                                                        APIs
                                                                        • RegCreateKeyW.ADVAPI32(80000001,Software\Classes\mscfile\shell\open\command,?), ref: 0041220F
                                                                        • RegSetValueExW.ADVAPI32(?,00469654,00000000,?,00000000,00000000,00469654,?,0040674F,00469654,C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe), ref: 0041223E
                                                                        • RegCloseKey.ADVAPI32(?,?,0040674F,00469654,C:\Users\user\Desktop\800399031-18.11.2024.pdf.exe), ref: 00412249
                                                                        Strings
                                                                        • Software\Classes\mscfile\shell\open\command, xrefs: 0041220D
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCreateValue
                                                                        • String ID: Software\Classes\mscfile\shell\open\command
                                                                        • API String ID: 1818849710-505396733
                                                                        • Opcode ID: a2b3254e269ed075d9dc061201a3f9a1afffdab784d1a4dfdfe539f8f512937d
                                                                        • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                                                        • Opcode Fuzzy Hash: a2b3254e269ed075d9dc061201a3f9a1afffdab784d1a4dfdfe539f8f512937d
                                                                        • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                                                                        APIs
                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                                                          • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                                                          • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                        • String ID: bad locale name
                                                                        • API String ID: 3628047217-1405518554
                                                                        • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                                                        • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                                                        • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                                                        • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                                                        APIs
                                                                        • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                                                        • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                                                        • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseCreateValue
                                                                        • String ID: P0F
                                                                        • API String ID: 1818849710-3540264436
                                                                        • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                                                        • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                                                        • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                                                        • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                                                        APIs
                                                                        • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004013FC
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00401403
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressHandleModuleProc
                                                                        • String ID: GetCursorInfo$User32.dll
                                                                        • API String ID: 1646373207-2714051624
                                                                        • Opcode ID: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                                                        • Instruction ID: b28a71f0ab0cd05a0e9183a6667f806437ada0decc35e30242c3667109896680
                                                                        • Opcode Fuzzy Hash: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                                                        • Instruction Fuzzy Hash: 8BB09BB5741301BB8A017B705E0D905357C550470375102A3B00386161F7F44500C61E
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014A1
                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004014A8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: GetLastInputInfo$User32.dll
                                                                        • API String ID: 2574300362-1519888992
                                                                        • Opcode ID: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                                                        • Instruction ID: 9c97512ccc3e9dae7fbe55962af9901819d65f6a69b3e33b2a0b565c767961ff
                                                                        • Opcode Fuzzy Hash: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                                                        • Instruction Fuzzy Hash: 51B092B1980302AB8E006FB1AE0DE043AB8A604703B5102B6B00292161EAF99440CF2E
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: __alldvrm$_strrchr
                                                                        • String ID:
                                                                        • API String ID: 1036877536-0
                                                                        • Opcode ID: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                                                        • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                                                                        • Opcode Fuzzy Hash: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                                                        • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: _free
                                                                        • String ID:
                                                                        • API String ID: 269201875-0
                                                                        • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                                                        • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                                                                        • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                                                        • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                                                        • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                                                                        • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                                                        • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                                                                        APIs
                                                                        Strings
                                                                        • [Cleared browsers logins and cookies.], xrefs: 0040B025
                                                                        • Cleared browsers logins and cookies., xrefs: 0040B036
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Sleep
                                                                        • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                        • API String ID: 3472027048-1236744412
                                                                        • Opcode ID: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                                                        • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                                                                        • Opcode Fuzzy Hash: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                                                        • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                                                                        APIs
                                                                          • Part of subcall function 004120E8: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                          • Part of subcall function 004120E8: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                          • Part of subcall function 004120E8: RegCloseKey.KERNELBASE(00000000), ref: 00412128
                                                                        • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseOpenQuerySleepValue
                                                                        • String ID: H"G$exepath$!G
                                                                        • API String ID: 4119054056-2148977334
                                                                        • Opcode ID: d156cd8a51638a8627d35fbdd7c90d8568819640595f3e7dc19cb873884dd4e6
                                                                        • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                                                        • Opcode Fuzzy Hash: d156cd8a51638a8627d35fbdd7c90d8568819640595f3e7dc19cb873884dd4e6
                                                                        • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                                                        APIs
                                                                          • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                                                          • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                                                          • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                                                        • Sleep.KERNEL32(000001F4), ref: 0040955A
                                                                        • Sleep.KERNEL32(00000064), ref: 004095F5
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Window$SleepText$ForegroundLength
                                                                        • String ID: [ $ ]
                                                                        • API String ID: 3309952895-93608704
                                                                        • Opcode ID: 50bd45538fc1325d318fbbf77384be1d7cd884a7cd54cef18345d66a056de0e4
                                                                        • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                                                        • Opcode Fuzzy Hash: 50bd45538fc1325d318fbbf77384be1d7cd884a7cd54cef18345d66a056de0e4
                                                                        • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                                                        • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                                                                        • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                                                        • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                                                        • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                                                                        • Opcode Fuzzy Hash: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                                                        • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                                                                        APIs
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                                                        • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: LibraryLoad$ErrorLast
                                                                        • String ID:
                                                                        • API String ID: 3177248105-0
                                                                        • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                                                        • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                                                        • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                                                        • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                                                                        APIs
                                                                        • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                                                                        • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                                                                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                                                                          • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                                                                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                        • String ID:
                                                                        • API String ID: 1761009282-0
                                                                        • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                        • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                                                                        • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                        • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                                                                        APIs
                                                                        • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorHandling__start
                                                                        • String ID: pow
                                                                        • API String ID: 3213639722-2276729525
                                                                        • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                                                        • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                                                        • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                                                        • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                                                        APIs
                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404046
                                                                          • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,74DF3530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                          • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                                                          • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                                                          • Part of subcall function 0041A20F: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                        • Sleep.KERNEL32(000000FA,00462E24), ref: 00404118
                                                                        Strings
                                                                        • /sort "Visit Time" /stext ", xrefs: 00404092
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                        • String ID: /sort "Visit Time" /stext "
                                                                        • API String ID: 368326130-1573945896
                                                                        • Opcode ID: 2f96630334efbfd4b306ff90604b490529d5dc6b98f029d45a81ae78404ef316
                                                                        • Instruction ID: 7f8942f24ccac46b0034012f494d3192eca769648d2eef92b07e1d28e9d76a7f
                                                                        • Opcode Fuzzy Hash: 2f96630334efbfd4b306ff90604b490529d5dc6b98f029d45a81ae78404ef316
                                                                        • Instruction Fuzzy Hash: B5316431A0021556CB14FBB6DC969EE73B9AF90308F40017FF506B71E2EE38594ACA99
                                                                        APIs
                                                                          • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                        • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Init_thread_footer__onexit
                                                                        • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                        • API String ID: 1881088180-3686566968
                                                                        • Opcode ID: 7103c85559471987959954c794bf5a9939257c7fe470f67ca2388a99a2e131d5
                                                                        • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                                                        • Opcode Fuzzy Hash: 7103c85559471987959954c794bf5a9939257c7fe470f67ca2388a99a2e131d5
                                                                        • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                                                        APIs
                                                                        • GetACP.KERNEL32(?,20001004,?,00000002), ref: 0044EDF2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ACP$OCP
                                                                        • API String ID: 0-711371036
                                                                        • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                                                        • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                                                                        • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                                                        • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                                                                        APIs
                                                                        • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                                                                        • IsWindowVisible.USER32(?), ref: 00415B37
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: Window$TextVisible
                                                                        • String ID: (%G
                                                                        • API String ID: 1670992164-3377777310
                                                                        • Opcode ID: 5332efaccc7d7c2c6cf63c14179539180dc6fa0cfb5aa13d9b40585e9b1c5967
                                                                        • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                                                                        • Opcode Fuzzy Hash: 5332efaccc7d7c2c6cf63c14179539180dc6fa0cfb5aa13d9b40585e9b1c5967
                                                                        • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                                                                        APIs
                                                                        • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                                                                        Strings
                                                                        • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404FFF
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: LocalTime
                                                                        • String ID: Connection KeepAlive | Enabled | Timeout:
                                                                        • API String ID: 481472006-507513762
                                                                        • Opcode ID: a8726f34dbf31cf40e7db5209114500087a3490dd5e7b49e6455b7329ad4a22d
                                                                        • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                                                                        • Opcode Fuzzy Hash: a8726f34dbf31cf40e7db5209114500087a3490dd5e7b49e6455b7329ad4a22d
                                                                        • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                                                                        APIs
                                                                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                                                                        • ___raise_securityfailure.LIBCMT ref: 00432E76
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                        • String ID: (F
                                                                        • API String ID: 3761405300-3109638091
                                                                        • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                                                        • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                                                                        • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                                                        • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                                                                        APIs
                                                                        • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: LocalTime
                                                                        • String ID: | $%02i:%02i:%02i:%03i
                                                                        • API String ID: 481472006-2430845779
                                                                        • Opcode ID: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                                                        • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                                                        • Opcode Fuzzy Hash: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                                                        • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                                                        APIs
                                                                        • GetDriveTypeA.KERNEL32(00000000,?,0000000A,00471E78,?), ref: 00406B60
                                                                        • lstrlenA.KERNEL32(00000000,00000000,0000002D), ref: 00406BBC
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DriveTypelstrlen
                                                                        • String ID: Ws@
                                                                        • API String ID: 1700768220-3833367170
                                                                        • Opcode ID: 0e5edb2266cd4b610cea852f101f42e9b8e15d10d9c755c24c9b2aaba250e15e
                                                                        • Instruction ID: bd7ac8bb915d3f0bfd94f66ba46fc9d40afea29ba7a9df804c5d05ff75fdb300
                                                                        • Opcode Fuzzy Hash: 0e5edb2266cd4b610cea852f101f42e9b8e15d10d9c755c24c9b2aaba250e15e
                                                                        • Instruction Fuzzy Hash: C7017071A041096ACB04F7B5DC56EADB76C9F54344F50007EF406A31E1EF785A06C689
                                                                        APIs
                                                                        • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExistsFilePath
                                                                        • String ID: alarm.wav$x(G
                                                                        • API String ID: 1174141254-2413638199
                                                                        • Opcode ID: 063e447dd27a8f3e036d16ecff9e9acab7f656fc78c84636d77534a964b77f13
                                                                        • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                                                                        • Opcode Fuzzy Hash: 063e447dd27a8f3e036d16ecff9e9acab7f656fc78c84636d77534a964b77f13
                                                                        • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                                                                        APIs
                                                                          • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                          • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                          • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                        • CloseHandle.KERNEL32(?), ref: 00409FFD
                                                                        • UnhookWindowsHookEx.USER32 ref: 0040A010
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                        • String ID: Online Keylogger Stopped
                                                                        • API String ID: 1623830855-1496645233
                                                                        • Opcode ID: 95be6b2d5d1265815bc3ce4225fc1cdac552dc75167390ee86932ead681b8db3
                                                                        • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                                                                        • Opcode Fuzzy Hash: 95be6b2d5d1265815bc3ce4225fc1cdac552dc75167390ee86932ead681b8db3
                                                                        • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                                                                        APIs
                                                                        • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1,?), ref: 0040B49A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExistsFilePath
                                                                        • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                        • API String ID: 1174141254-2800177040
                                                                        • Opcode ID: f72588871a47a103f08bd557687f8b84f797b2eb235cb9e389d344094cad4272
                                                                        • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                                                        • Opcode Fuzzy Hash: f72588871a47a103f08bd557687f8b84f797b2eb235cb9e389d344094cad4272
                                                                        • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                                                        APIs
                                                                        • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E,?), ref: 0040B437
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExistsFilePath
                                                                        • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                        • API String ID: 1174141254-4188645398
                                                                        • Opcode ID: 4c5869dc73605c4198742c87f314f8ffe11a8100b16f69da5b982344c5d6b7fa
                                                                        • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                                                        • Opcode Fuzzy Hash: 4c5869dc73605c4198742c87f314f8ffe11a8100b16f69da5b982344c5d6b7fa
                                                                        • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                                                        APIs
                                                                        • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604,?), ref: 0040B4FD
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExistsFilePath
                                                                        • String ID: AppData$\Opera Software\Opera Stable\
                                                                        • API String ID: 1174141254-1629609700
                                                                        • Opcode ID: 0cb57bc748a43cdf280c296903742492f5481ab6d2799d92af52763c0172cfec
                                                                        • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                                                        • Opcode Fuzzy Hash: 0cb57bc748a43cdf280c296903742492f5481ab6d2799d92af52763c0172cfec
                                                                        • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                                                        APIs
                                                                        • GetKeyState.USER32(00000011), ref: 0040A597
                                                                          • Part of subcall function 00409468: GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                                                          • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                                                          • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                                                          • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                                                          • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                                                          • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                                                          • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                                                        • String ID: [AltL]$[AltR]
                                                                        • API String ID: 3195419117-2658077756
                                                                        • Opcode ID: c7c7ad3f27c2af8ea36dcc5d825e618062cde7260dbebf7789c9b1878f0a465e
                                                                        • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                                                        • Opcode Fuzzy Hash: c7c7ad3f27c2af8ea36dcc5d825e618062cde7260dbebf7789c9b1878f0a465e
                                                                        • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                                                        APIs
                                                                        • GetKeyState.USER32(00000012), ref: 0040A5F1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: State
                                                                        • String ID: [CtrlL]$[CtrlR]
                                                                        • API String ID: 1649606143-2446555240
                                                                        • Opcode ID: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                                                        • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                                                        • Opcode Fuzzy Hash: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                                                        • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                                                        APIs
                                                                        • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,004721E8,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,004721E8), ref: 00412422
                                                                        • RegDeleteValueW.ADVAPI32(004721E8,?,?,00472200,pth_unenc,004721E8), ref: 00412436
                                                                        Strings
                                                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: DeleteOpenValue
                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                        • API String ID: 2654517830-1051519024
                                                                        • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                                                        • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                                                        • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                                                        • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                                                        APIs
                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                                                                          • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                                                                          • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                        • String ID: P@
                                                                        • API String ID: 1586462112-676759640
                                                                        • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                                                        • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                                                                        • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                                                        • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                                                                        APIs
                                                                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                                                                          • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                                                                          • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                        • String ID: P@
                                                                        • API String ID: 1586462112-676759640
                                                                        • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                                                        • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                                                                        • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                                                        • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                                                                        APIs
                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                                                        • GetLastError.KERNEL32 ref: 0043B4E9
                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                        • String ID:
                                                                        • API String ID: 1717984340-0
                                                                        • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                                                        • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                                                        • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                                                        • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                                                        APIs
                                                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                                                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                                                                        • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                                                                        • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                                                        Memory Dump Source
                                                                        • Source File: 00000002.00000002.4136288474.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_2_2_400000_800399031-18.jbxd
                                                                        Yara matches
                                                                        Similarity
                                                                        • API ID: ErrorLastRead
                                                                        • String ID:
                                                                        • API String ID: 4100373531-0
                                                                        • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                                                        • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                                                        • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                                                        • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19