Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe

Overview

General Information

Sample name:17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
Analysis ID:1561340
MD5:0a5ef4ce865711c55bbd9e3ba61bcd4f
SHA1:af23d89a402faaf366a0374a24dcd5844b386d62
SHA256:fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Installs a global keyboard hook
Machine Learning detection for sample
Uses dynamic DNS services
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["championsleague24.duckdns.org:8090:1"], "Assigned name": "oct24", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "wsbdetrdfeyt45-ZLEH2L", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "ops.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "windir"}
SourceRuleDescriptionAuthorStrings
17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
    17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeJoeSecurity_RemcosYara detected Remcos RATJoe Security
      17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeWindows_Trojan_Remcos_b296e965unknownunknown
        • 0x6aab8:$a1: Remcos restarted by watchdog!
        • 0x6b030:$a3: %02i:%02i:%02i:%03i
        17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeREMCOS_RAT_variantsunknownunknown
        • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
        • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
        • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
        • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
        • 0x64b7c:$str_b2: Executing file:
        • 0x65bfc:$str_b3: GetDirectListeningPort
        • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
        • 0x65728:$str_b7: \update.vbs
        • 0x64ba4:$str_b9: Downloaded file:
        • 0x64b90:$str_b10: Downloading file:
        • 0x64c34:$str_b12: Failed to upload file:
        • 0x65bc4:$str_b13: StartForward
        • 0x65be4:$str_b14: StopForward
        • 0x65680:$str_b15: fso.DeleteFile "
        • 0x65614:$str_b16: On Error Resume Next
        • 0x656b0:$str_b17: fso.DeleteFolder "
        • 0x64c24:$str_b18: Uploaded file:
        • 0x64be4:$str_b19: Unable to delete:
        • 0x65648:$str_b20: while fso.FileExists("
        • 0x650c1:$str_c0: [Firefox StoredLogins not found]
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
              • 0x134b8:$a1: Remcos restarted by watchdog!
              • 0x13a30:$a3: %02i:%02i:%02i:%03i
              00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                Click to see the 7 entries
                SourceRuleDescriptionAuthorStrings
                0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                    0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                      0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                      • 0x6aab8:$a1: Remcos restarted by watchdog!
                      • 0x6b030:$a3: %02i:%02i:%02i:%03i
                      0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                      • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                      • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                      • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                      • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                      • 0x64b7c:$str_b2: Executing file:
                      • 0x65bfc:$str_b3: GetDirectListeningPort
                      • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                      • 0x65728:$str_b7: \update.vbs
                      • 0x64ba4:$str_b9: Downloaded file:
                      • 0x64b90:$str_b10: Downloading file:
                      • 0x64c34:$str_b12: Failed to upload file:
                      • 0x65bc4:$str_b13: StartForward
                      • 0x65be4:$str_b14: StopForward
                      • 0x65680:$str_b15: fso.DeleteFile "
                      • 0x65614:$str_b16: On Error Resume Next
                      • 0x656b0:$str_b17: fso.DeleteFolder "
                      • 0x64c24:$str_b18: Uploaded file:
                      • 0x64be4:$str_b19: Unable to delete:
                      • 0x65648:$str_b20: while fso.FileExists("
                      • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                      Click to see the 7 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-11-23T06:53:40.459003+010020365941Malware Command and Control Activity Detected192.168.2.849988180.19.180.1228090TCP
                      2024-11-23T06:54:09.689710+010020365941Malware Command and Control Activity Detected192.168.2.849705180.19.180.1228090TCP
                      2024-11-23T06:54:32.737082+010020365941Malware Command and Control Activity Detected192.168.2.849712180.19.180.1228090TCP
                      2024-11-23T06:54:55.841094+010020365941Malware Command and Control Activity Detected192.168.2.849713180.19.180.1228090TCP
                      2024-11-23T06:55:19.137812+010020365941Malware Command and Control Activity Detected192.168.2.849746180.19.180.1228090TCP
                      2024-11-23T06:55:42.233297+010020365941Malware Command and Control Activity Detected192.168.2.849798180.19.180.1228090TCP
                      2024-11-23T06:56:05.317024+010020365941Malware Command and Control Activity Detected192.168.2.849850180.19.180.1228090TCP
                      2024-11-23T06:56:28.661358+010020365941Malware Command and Control Activity Detected192.168.2.849901180.19.180.1228090TCP
                      2024-11-23T06:56:51.749345+010020365941Malware Command and Control Activity Detected192.168.2.849953180.19.180.1228090TCP
                      2024-11-23T06:57:14.756127+010020365941Malware Command and Control Activity Detected192.168.2.849986180.19.180.1228090TCP
                      2024-11-23T06:57:38.205432+010020365941Malware Command and Control Activity Detected192.168.2.849987180.19.180.1228090TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeAvira: detected
                      Source: championsleague24.duckdns.orgAvira URL Cloud: Label: malware
                      Source: 00000000.00000002.4101410494.00000000007BE000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["championsleague24.duckdns.org:8090:1"], "Assigned name": "oct24", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "wsbdetrdfeyt45-ZLEH2L", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "ops.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "windir"}
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeReversingLabs: Detection: 86%
                      Source: Yara matchFile source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTR
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,0_2_004338C8
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_c69971b3-7

                      Exploits

                      barindex
                      Source: Yara matchFile source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTR

                      Privilege Escalation

                      barindex
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00407538 _wcslen,CoGetObject,0_2_00407538
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49712 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49746 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49705 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49713 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49986 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49850 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49987 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49798 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49901 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49953 -> 180.19.180.122:8090
                      Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.8:49988 -> 180.19.180.122:8090
                      Source: Malware configuration extractorURLs: championsleague24.duckdns.org
                      Source: unknownDNS query: name: championsleague24.duckdns.org
                      Source: global trafficTCP traffic: 192.168.2.8:49705 -> 180.19.180.122:8090
                      Source: Joe Sandbox ViewASN Name: OCNNTTCommunicationsCorporationJP OCNNTTCommunicationsCorporationJP
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00426D42 recv,0_2_00426D42
                      Source: global trafficDNS traffic detected: DNS query: championsleague24.duckdns.org
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeString found in binary or memory: http://geoplugin.net/json.gp/C

                      Key, Mouse, Clipboard, Microphone and Screen Capturing

                      barindex
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000000_2_0040A2F3
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_004168FC
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,0_2_0040B749
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,0_2_0040A41B
                      Source: Yara matchFile source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTR

                      E-Banking Fraud

                      barindex
                      Source: Yara matchFile source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTR

                      Spam, unwanted Advertisements and Ransom Demands

                      barindex
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041CA73 SystemParametersInfoW,0_2_0041CA73

                      System Summary

                      barindex
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                      Source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                      Source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeProcess Stats: CPU usage > 49%
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_0041330D
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,0_2_0041BBC6
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,0_2_0041BB9A
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,0_2_004167EF
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043706A0_2_0043706A
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004140050_2_00414005
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043E11C0_2_0043E11C
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004541D90_2_004541D9
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004381E80_2_004381E8
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041F18B0_2_0041F18B
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004462700_2_00446270
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043E34B0_2_0043E34B
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004533AB0_2_004533AB
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0042742E0_2_0042742E
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004375660_2_00437566
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043E5A80_2_0043E5A8
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004387F00_2_004387F0
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043797E0_2_0043797E
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004339D70_2_004339D7
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0044DA490_2_0044DA49
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00427AD70_2_00427AD7
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041DBF30_2_0041DBF3
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00427C400_2_00427C40
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00437DB30_2_00437DB3
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00435EEB0_2_00435EEB
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043DEED0_2_0043DEED
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00426E9F0_2_00426E9F
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: String function: 00402093 appears 50 times
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: String function: 00401E65 appears 34 times
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: String function: 00434E70 appears 54 times
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: String function: 00434801 appears 42 times
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                      Source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                      Source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                      Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@1/1@5/1
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,0_2_0041798D
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,0_2_0040F4AF
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,0_2_0041B539
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeMutant created: \Sessions\1\BaseNamedObjects\wsbdetrdfeyt45-ZLEH2L
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: Software\0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: 0SG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: Exe0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: Exe0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: 0SG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: (TG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: ,aF0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: Inj0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: Inj0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: RG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: RG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: RG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: HSG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: RG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: exepath0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: ,aF0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: HSG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: exepath0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: RG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: licence0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: tMG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: `SG0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: Administrator0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: User0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: del0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: del0_2_0040EA00
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCommand line argument: del0_2_0040EA00
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeReversingLabs: Detection: 86%
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00457186 push ecx; ret 0_2_00457199
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00457AA8 push eax; ret 0_2_00457AC6
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00434EB6 push ecx; ret 0_2_00434EC9
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00406EEB ShellExecuteW,URLDownloadToFileW,0_2_00406EEB
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_0041AADB
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040F7E2 Sleep,ExitProcess,0_2_0040F7E2
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,0_2_0041A7D9
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeWindow / User API: threadDelayed 4152Jump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeWindow / User API: threadDelayed 5411Jump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeWindow / User API: foregroundWindowGot 1770Jump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe TID: 6884Thread sleep count: 183 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe TID: 6884Thread sleep time: -91500s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe TID: 6508Thread sleep count: 4152 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe TID: 6508Thread sleep time: -12456000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe TID: 6508Thread sleep count: 5411 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe TID: 6508Thread sleep time: -16233000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_0040928E
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,0_2_0041C322
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,0_2_0040C388
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_004096A0
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,0_2_00408847
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00407877 FindFirstFileW,FindNextFileW,0_2_00407877
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0044E8F9 FindFirstFileExA,0_2_0044E8F9
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,0_2_0040BB6B
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,0_2_00419B86
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,0_2_0040BD72
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,0_2_00407CD2
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, 00000000.00000002.4101410494.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll?
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeAPI call chain: ExitProcess graph end nodegraph_0-48676
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,0_2_0041CBE1
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00443355 mov eax, dword ptr fs:[00000030h]0_2_00443355
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_004120B2 GetProcessHeap,HeapFree,0_2_004120B2
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0043503C
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00434A8A
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0043BB71
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00434BD8 SetUnhandledExceptionFilter,0_2_00434BD8
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe0_2_00412132
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00419662 mouse_event,0_2_00419662
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, 00000000.00000002.4101410494.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, 00000000.00000002.4101410494.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerckets2^b[e
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, 00000000.00000002.4101410494.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageres }
                      Source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, 00000000.00000002.4101410494.00000000007BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00434CB6 cpuid 0_2_00434CB6
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_0045201B
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_004520B6
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00452143
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetLocaleInfoW,0_2_00452393
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00448484
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_004524BC
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetLocaleInfoW,0_2_004525C3
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00452690
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetLocaleInfoW,0_2_0044896D
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: GetLocaleInfoA,0_2_0040F90C
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_00451D58
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: EnumSystemLocalesW,0_2_00451FD0
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00404F51 GetLocalTime,CreateEventA,CreateThread,0_2_00404F51
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_0041B69E GetComputerNameExW,GetUserNameW,0_2_0041B69E
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: 0_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00449210
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_0040BA4D
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\0_2_0040BB6B
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: \key3.db0_2_0040BB6B

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, type: SAMPLE
                      Source: Yara matchFile source: 0.2.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.0.17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe PID: 1092, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exeCode function: cmd.exe0_2_0040569A
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Deobfuscate/Decode Files or Information
                      1
                      OS Credential Dumping
                      2
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      11
                      Ingress Tool Transfer
                      Exfiltration Over Other Network Medium1
                      System Shutdown/Reboot
                      CredentialsDomainsDefault Accounts12
                      Command and Scripting Interpreter
                      1
                      Windows Service
                      1
                      Bypass User Account Control
                      2
                      Obfuscated Files or Information
                      211
                      Input Capture
                      1
                      Account Discovery
                      Remote Desktop Protocol211
                      Input Capture
                      2
                      Encrypted Channel
                      Exfiltration Over Bluetooth1
                      Defacement
                      Email AddressesDNS ServerDomain Accounts2
                      Service Execution
                      Logon Script (Windows)1
                      Access Token Manipulation
                      1
                      DLL Side-Loading
                      2
                      Credentials In Files
                      1
                      System Service Discovery
                      SMB/Windows Admin Shares3
                      Clipboard Data
                      1
                      Non-Standard Port
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                      Windows Service
                      1
                      Bypass User Account Control
                      NTDS2
                      File and Directory Discovery
                      Distributed Component Object ModelInput Capture1
                      Non-Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script11
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      LSA Secrets23
                      System Information Discovery
                      SSHKeylogging21
                      Application Layer Protocol
                      Scheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Access Token Manipulation
                      Cached Domain Credentials21
                      Security Software Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                      Process Injection
                      DCSync1
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem2
                      Process Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                      Application Window Discovery
                      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                      System Owner/User Discovery
                      Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe87%ReversingLabsWin32.Backdoor.Remcos
                      17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe100%AviraBDS/Backdoor.Gen
                      17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      championsleague24.duckdns.org100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      championsleague24.duckdns.org
                      180.19.180.122
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        championsleague24.duckdns.orgtrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gp17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exefalse
                          high
                          http://geoplugin.net/json.gp/C17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exefalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            180.19.180.122
                            championsleague24.duckdns.orgJapan4713OCNNTTCommunicationsCorporationJPtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1561340
                            Start date and time:2024-11-23 06:52:17 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 58s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@1/1@5/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 32
                            • Number of non-executed functions: 215
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Override analysis time to 240s for sample files taking high CPU consumption
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • VT rate limit hit for: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
                            TimeTypeDescription
                            00:54:17API Interceptor5610021x Sleep call for process: 17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe modified
                            No context
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            OCNNTTCommunicationsCorporationJPmpsl.elfGet hashmaliciousMirai, MoobotBrowse
                            • 210.163.112.102
                            powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            • 58.94.30.29
                            arm.elfGet hashmaliciousMirai, MoobotBrowse
                            • 153.214.0.121
                            sh4.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            • 153.152.49.77
                            arm5.elfGet hashmaliciousMirai, MoobotBrowse
                            • 219.166.211.86
                            m68k.elfGet hashmaliciousMirai, MoobotBrowse
                            • 153.179.224.107
                            arm6.elfGet hashmaliciousMirai, MoobotBrowse
                            • 210.154.165.95
                            arm5.nn-20241122-0008.elfGet hashmaliciousMirai, OkiruBrowse
                            • 153.209.73.157
                            arm.nn-20241122-0008.elfGet hashmaliciousMirai, OkiruBrowse
                            • 114.145.143.13
                            mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                            • 124.100.105.82
                            No context
                            No context
                            Process:C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):224
                            Entropy (8bit):7.0593688728538595
                            Encrypted:false
                            SSDEEP:6:6YvaYCYpjmnQ+C7l4xRSUEH3JINZn7ExFnvQP:6YSYCYpKEIRSTHZIH4kP
                            MD5:B455A4B18DC00A6CF7F372A26C7570B4
                            SHA1:2EE63CBC5E614FAAB35C4ADD10BA4A353745B85E
                            SHA-256:E1A4443E4A10C07D4BAE333089615E13CCEC44E9FE756D746AFF7D8E4FBA59CE
                            SHA-512:CB5B8DA61448666EA29971D5CEEF2BAF9C49D1156B4F2A6E554B3D84443D54F986285B8A03481EE2ACE42074BC875BBD7E0EFF917024A5FAB988A58E348D37A1
                            Malicious:false
                            Reputation:low
                            Preview:........g#pxZ.I..28....*.E6...:..-.{.l...j....[$A.....=.f.]W.qZ..F!....*nd.e.%rYs...:.6Iv.....]D@H.9Z.f.l.%..>Rh]......!.5..F..F...&.F...a.....0..`.j...e">....B.w=../(..GH....D..8.?"ES"......D.(....Nq..vc..f..|d.
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.600536037690552
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
                            File size:494'592 bytes
                            MD5:0a5ef4ce865711c55bbd9e3ba61bcd4f
                            SHA1:af23d89a402faaf366a0374a24dcd5844b386d62
                            SHA256:fc7beeae6b795561f216733b82611c8db1643cc883ded6fbca9c447c7a985358
                            SHA512:f79a23f44518c1fb363264fa5bde787ba44d80bff1af7464f2f515ef9b45aa4774f13ae4dc5440fa15918db3c9224183a1b12d2731059dec1f2b85640f0f8030
                            SSDEEP:12288:W5k+Yqaxrh3Nln+N52fIA4jbsvZzFVA4:gY9xrh3NDfIA4jOZx
                            TLSH:B3B49E01BAD2C072D97514300D3AF776EAB8BD201835497B73DA1D5BFE31190A72AAB7
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{.-H..~H..~H..~..'~[..~..%~...~..$~V..~AbR~I..~...~J..~.D..R..~.D..r..~.D..j..~AbE~Q..~H..~v..~.D..,..~.D)~I..~.D..I..~RichH..
                            Icon Hash:95694d05214c1b33
                            Entrypoint:0x434a80
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x6710C0B1 [Thu Oct 17 07:45:53 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:1389569a3a39186f3eb453b501cfe688
                            Instruction
                            call 00007FC2587ECB6Bh
                            jmp 00007FC2587EC5B3h
                            push ebp
                            mov ebp, esp
                            sub esp, 00000324h
                            push ebx
                            push esi
                            push 00000017h
                            call 00007FC25880EE03h
                            test eax, eax
                            je 00007FC2587EC727h
                            mov ecx, dword ptr [ebp+08h]
                            int 29h
                            xor esi, esi
                            lea eax, dword ptr [ebp-00000324h]
                            push 000002CCh
                            push esi
                            push eax
                            mov dword ptr [00471D14h], esi
                            call 00007FC2587EEB76h
                            add esp, 0Ch
                            mov dword ptr [ebp-00000274h], eax
                            mov dword ptr [ebp-00000278h], ecx
                            mov dword ptr [ebp-0000027Ch], edx
                            mov dword ptr [ebp-00000280h], ebx
                            mov dword ptr [ebp-00000284h], esi
                            mov dword ptr [ebp-00000288h], edi
                            mov word ptr [ebp-0000025Ch], ss
                            mov word ptr [ebp-00000268h], cs
                            mov word ptr [ebp-0000028Ch], ds
                            mov word ptr [ebp-00000290h], es
                            mov word ptr [ebp-00000294h], fs
                            mov word ptr [ebp-00000298h], gs
                            pushfd
                            pop dword ptr [ebp-00000264h]
                            mov eax, dword ptr [ebp+04h]
                            mov dword ptr [ebp-0000026Ch], eax
                            lea eax, dword ptr [ebp+04h]
                            mov dword ptr [ebp-00000260h], eax
                            mov dword ptr [ebp-00000324h], 00010001h
                            mov eax, dword ptr [eax-04h]
                            push 00000050h
                            mov dword ptr [ebp-00000270h], eax
                            lea eax, dword ptr [ebp-58h]
                            push esi
                            push eax
                            call 00007FC2587EEAEDh
                            Programming Language:
                            • [C++] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6eeb80x104.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x790000x4b34.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000x3bc8.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x6d3500x38.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x6d3e40x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6d3880x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x590000x500.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x571f50x5720042490688bcf3aaa371282a7454b99e23False0.5716155173959828data6.625772280516175IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x590000x179dc0x17a008c19f58f5a4e5f2d5359d54234473252False0.5008370535714286data5.862025333737917IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x710000x5d540xe000eaccffe1cb836994ce5d3ccfb22d4f9False0.22126116071428573data3.0035180736120775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .tls0x770000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .gfids0x780000x2300x4009ca325bce9f8c0342c0381814603584aFalse0.330078125data2.3999762503719224IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x790000x4b340x4c00678782decc7c5d547ea16a83039e656dFalse0.2824835526315789data3.986253692684117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x7e0000x3bc80x3c0071caad037f5f2070293ebf9ebb49e4e2False0.764453125data6.724383647387111IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x7918c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                            RT_ICON0x795f40x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.27704918032786885
                            RT_ICON0x79f7c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.23686679174484052
                            RT_ICON0x7b0240x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.22977178423236513
                            RT_RCDATA0x7d5cc0x527data1.0083396512509477
                            RT_GROUP_ICON0x7daf40x3edataEnglishUnited States0.8064516129032258
                            DLLImport
                            KERNEL32.dllFindNextFileA, ExpandEnvironmentStringsA, GetLongPathNameW, CopyFileW, GetLocaleInfoA, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, VirtualProtect, SetLastError, VirtualFree, VirtualAlloc, GetNativeSystemInfo, HeapAlloc, GetProcessHeap, FreeLibrary, IsBadReadPtr, GetTempPathW, OpenProcess, OpenMutexA, lstrcatW, GetCurrentProcessId, GetTempFileNameW, UnmapViewOfFile, DuplicateHandle, CreateFileMappingW, MapViewOfFile, GetSystemDirectoryA, GlobalAlloc, GlobalLock, GetTickCount, GlobalUnlock, WriteProcessMemory, ResumeThread, GetThreadContext, ReadProcessMemory, CreateProcessW, SetThreadContext, LocalAlloc, GlobalFree, MulDiv, SizeofResource, QueryDosDeviceW, FindFirstVolumeW, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, lstrlenW, GetStdHandle, SetFilePointer, FindResourceA, LockResource, LoadResource, LocalFree, FindVolumeClose, GetVolumePathNamesForVolumeNameW, lstrcpyW, FindFirstFileA, FormatMessageA, FindNextVolumeW, AllocConsole, lstrcmpW, GetModuleFileNameA, lstrcpynA, QueryPerformanceFrequency, QueryPerformanceCounter, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, DeleteCriticalSection, HeapSize, WriteConsoleW, SetStdHandle, SetEnvironmentVariableW, SetEnvironmentVariableA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, IsValidCodePage, FindFirstFileExA, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, GetFileType, GetTimeZoneInformation, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapReAlloc, GetACP, GetModuleHandleExW, MoveFileExW, RtlUnwind, RaiseException, LoadLibraryExW, GetCPInfo, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, GetFileSize, TerminateThread, GetLastError, CreateDirectoryW, GetModuleHandleA, RemoveDirectoryW, MoveFileW, SetFilePointerEx, GetLogicalDriveStringsA, DeleteFileW, DeleteFileA, SetFileAttributesW, GetFileAttributesW, FindClose, lstrlenA, GetDriveTypeA, FindNextFileW, GetFileSizeEx, FindFirstFileW, GetModuleHandleW, ExitProcess, CreateMutexA, GetCurrentProcess, GetProcAddress, LoadLibraryA, CreateProcessA, PeekNamedPipe, CreatePipe, TerminateProcess, ReadFile, HeapFree, HeapCreate, CreateEventA, GetLocalTime, CreateThread, SetEvent, CreateEventW, WaitForSingleObject, Sleep, GetModuleFileNameW, CloseHandle, ExitThread, CreateFileW, WriteFile, SetConsoleOutputCP, InitializeCriticalSectionAndSpinCount, MultiByteToWideChar, DecodePointer, EncodePointer, WideCharToMultiByte, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, WaitForSingleObjectEx, ResetEvent, SetEndOfFile
                            USER32.dllGetMessageA, GetWindowTextW, wsprintfW, GetClipboardData, UnhookWindowsHookEx, GetForegroundWindow, ToUnicodeEx, GetKeyboardLayout, SetWindowsHookExA, CloseClipboard, OpenClipboard, GetKeyboardState, CallNextHookEx, GetKeyboardLayoutNameA, GetKeyState, GetWindowTextLengthW, DispatchMessageA, SetForegroundWindow, SetClipboardData, EnumWindows, ExitWindowsEx, EmptyClipboard, ShowWindow, SetWindowTextW, MessageBoxW, IsWindowVisible, CloseWindow, SendInput, EnumDisplaySettingsW, mouse_event, CreatePopupMenu, TranslateMessage, TrackPopupMenu, DefWindowProcA, CreateWindowExA, AppendMenuA, GetSystemMetrics, RegisterClassExA, GetCursorPos, SystemParametersInfoW, GetWindowThreadProcessId, MapVirtualKeyA, DrawIcon, GetIconInfo
                            GDI32.dllBitBlt, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, StretchBlt, GetDIBits, DeleteObject, CreateDCA, GetObjectA, DeleteDC
                            ADVAPI32.dllCryptAcquireContextA, CryptGenRandom, CryptReleaseContext, GetUserNameW, RegEnumKeyExA, QueryServiceStatus, CloseServiceHandle, OpenSCManagerW, OpenSCManagerA, ControlService, StartServiceW, QueryServiceConfigW, ChangeServiceConfigW, OpenServiceW, EnumServicesStatusW, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegCreateKeyA, RegCloseKey, RegQueryInfoKeyW, RegQueryValueExA, RegCreateKeyExW, RegEnumKeyExW, RegSetValueExW, RegSetValueExA, RegOpenKeyExA, RegOpenKeyExW, RegCreateKeyW, RegDeleteValueW, RegEnumValueW, RegQueryValueExW, RegDeleteKeyA
                            SHELL32.dllShellExecuteExA, Shell_NotifyIconA, ExtractIconA, ShellExecuteW
                            ole32.dllCoInitializeEx, CoUninitialize, CoGetObject
                            SHLWAPI.dllPathFileExistsW, PathFileExistsA, StrToIntA
                            WINMM.dllwaveInOpen, waveInStart, waveInAddBuffer, PlaySoundW, mciSendStringA, mciSendStringW, waveInClose, waveInStop, waveInPrepareHeader, waveInUnprepareHeader
                            WS2_32.dllgethostbyname, send, WSAStartup, closesocket, inet_ntoa, htons, htonl, getservbyname, ntohs, getservbyport, gethostbyaddr, inet_addr, WSASetLastError, WSAGetLastError, recv, connect, socket
                            urlmon.dllURLOpenBlockingStreamW, URLDownloadToFileW
                            gdiplus.dllGdipSaveImageToStream, GdipGetImageEncodersSize, GdipFree, GdipDisposeImage, GdipAlloc, GdipCloneImage, GdipGetImageEncoders, GdiplusStartup, GdipLoadImageFromStream
                            WININET.dllInternetOpenUrlW, InternetOpenW, InternetCloseHandle, InternetReadFile
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-11-23T06:53:40.459003+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849988180.19.180.1228090TCP
                            2024-11-23T06:54:09.689710+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849705180.19.180.1228090TCP
                            2024-11-23T06:54:32.737082+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849712180.19.180.1228090TCP
                            2024-11-23T06:54:55.841094+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849713180.19.180.1228090TCP
                            2024-11-23T06:55:19.137812+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849746180.19.180.1228090TCP
                            2024-11-23T06:55:42.233297+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849798180.19.180.1228090TCP
                            2024-11-23T06:56:05.317024+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849850180.19.180.1228090TCP
                            2024-11-23T06:56:28.661358+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849901180.19.180.1228090TCP
                            2024-11-23T06:56:51.749345+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849953180.19.180.1228090TCP
                            2024-11-23T06:57:14.756127+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849986180.19.180.1228090TCP
                            2024-11-23T06:57:38.205432+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.849987180.19.180.1228090TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 23, 2024 06:53:47.611891985 CET497058090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:53:47.731446981 CET809049705180.19.180.122192.168.2.8
                            Nov 23, 2024 06:53:47.731611013 CET497058090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:53:47.805025101 CET497058090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:53:47.924745083 CET809049705180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:09.689657927 CET809049705180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:09.689709902 CET497058090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:09.689780951 CET497058090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:09.809319973 CET809049705180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:10.694890976 CET497128090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:10.814426899 CET809049712180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:10.816848993 CET497128090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:10.820549011 CET497128090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:10.939976931 CET809049712180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:32.736952066 CET809049712180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:32.737082005 CET497128090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:32.737267971 CET497128090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:32.856674910 CET809049712180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:33.743586063 CET497138090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:33.863276958 CET809049713180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:33.863358974 CET497138090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:33.867383003 CET497138090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:33.986983061 CET809049713180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:55.840981007 CET809049713180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:55.841094017 CET497138090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:55.841136932 CET497138090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:55.960645914 CET809049713180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:57.059123993 CET497468090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:57.178944111 CET809049746180.19.180.122192.168.2.8
                            Nov 23, 2024 06:54:57.179075956 CET497468090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:57.182538986 CET497468090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:54:57.302062988 CET809049746180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:19.137734890 CET809049746180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:19.137811899 CET497468090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:19.137939930 CET497468090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:19.257446051 CET809049746180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:20.147798061 CET497988090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:20.267304897 CET809049798180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:20.267395973 CET497988090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:20.270867109 CET497988090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:20.390320063 CET809049798180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:42.233141899 CET809049798180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:42.233297110 CET497988090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:42.233344078 CET497988090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:42.352823973 CET809049798180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:43.241893053 CET498508090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:43.361392975 CET809049850180.19.180.122192.168.2.8
                            Nov 23, 2024 06:55:43.361547947 CET498508090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:43.364968061 CET498508090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:55:43.484672070 CET809049850180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:05.316911936 CET809049850180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:05.317023993 CET498508090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:05.317079067 CET498508090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:05.436520100 CET809049850180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:06.648118973 CET499018090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:06.767576933 CET809049901180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:06.768054962 CET499018090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:06.771433115 CET499018090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:06.890882015 CET809049901180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:28.661303043 CET809049901180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:28.661358118 CET499018090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:28.661397934 CET499018090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:28.780893087 CET809049901180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:29.663736105 CET499538090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:29.783555984 CET809049953180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:29.783646107 CET499538090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:29.788315058 CET499538090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:29.907793999 CET809049953180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:51.749017000 CET809049953180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:51.749345064 CET499538090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:51.749450922 CET499538090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:51.868896008 CET809049953180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:52.761451960 CET499868090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:52.880951881 CET809049986180.19.180.122192.168.2.8
                            Nov 23, 2024 06:56:52.881277084 CET499868090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:52.884717941 CET499868090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:56:53.004169941 CET809049986180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:14.756064892 CET809049986180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:14.756127119 CET499868090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:14.756207943 CET499868090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:14.875648975 CET809049986180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:16.130889893 CET499878090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:16.250533104 CET809049987180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:16.250643969 CET499878090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:16.319035053 CET499878090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:16.438591003 CET809049987180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:38.203145027 CET809049987180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:38.205431938 CET499878090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:38.211309910 CET499878090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:38.330832005 CET809049987180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:39.226485014 CET499888090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:39.346025944 CET809049988180.19.180.122192.168.2.8
                            Nov 23, 2024 06:57:39.346108913 CET499888090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:39.349988937 CET499888090192.168.2.8180.19.180.122
                            Nov 23, 2024 06:57:39.469451904 CET809049988180.19.180.122192.168.2.8
                            TimestampSource PortDest PortSource IPDest IP
                            Nov 23, 2024 06:53:45.869653940 CET5121353192.168.2.81.1.1.1
                            Nov 23, 2024 06:53:46.865681887 CET5121353192.168.2.81.1.1.1
                            Nov 23, 2024 06:53:47.591306925 CET53512131.1.1.1192.168.2.8
                            Nov 23, 2024 06:53:47.591356993 CET53512131.1.1.1192.168.2.8
                            Nov 23, 2024 06:54:56.850348949 CET5656953192.168.2.81.1.1.1
                            Nov 23, 2024 06:54:57.058058023 CET53565691.1.1.1192.168.2.8
                            Nov 23, 2024 06:56:06.319789886 CET5153453192.168.2.81.1.1.1
                            Nov 23, 2024 06:56:06.643135071 CET53515341.1.1.1192.168.2.8
                            Nov 23, 2024 06:57:15.788054943 CET5487453192.168.2.81.1.1.1
                            Nov 23, 2024 06:57:16.117265940 CET53548741.1.1.1192.168.2.8
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Nov 23, 2024 06:53:45.869653940 CET192.168.2.81.1.1.10x5c42Standard query (0)championsleague24.duckdns.orgA (IP address)IN (0x0001)false
                            Nov 23, 2024 06:53:46.865681887 CET192.168.2.81.1.1.10x5c42Standard query (0)championsleague24.duckdns.orgA (IP address)IN (0x0001)false
                            Nov 23, 2024 06:54:56.850348949 CET192.168.2.81.1.1.10x286eStandard query (0)championsleague24.duckdns.orgA (IP address)IN (0x0001)false
                            Nov 23, 2024 06:56:06.319789886 CET192.168.2.81.1.1.10xf0c0Standard query (0)championsleague24.duckdns.orgA (IP address)IN (0x0001)false
                            Nov 23, 2024 06:57:15.788054943 CET192.168.2.81.1.1.10x9998Standard query (0)championsleague24.duckdns.orgA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Nov 23, 2024 06:53:47.591306925 CET1.1.1.1192.168.2.80x5c42No error (0)championsleague24.duckdns.org180.19.180.122A (IP address)IN (0x0001)false
                            Nov 23, 2024 06:53:47.591356993 CET1.1.1.1192.168.2.80x5c42No error (0)championsleague24.duckdns.org180.19.180.122A (IP address)IN (0x0001)false
                            Nov 23, 2024 06:54:57.058058023 CET1.1.1.1192.168.2.80x286eNo error (0)championsleague24.duckdns.org180.19.180.122A (IP address)IN (0x0001)false
                            Nov 23, 2024 06:56:06.643135071 CET1.1.1.1192.168.2.80xf0c0No error (0)championsleague24.duckdns.org180.19.180.122A (IP address)IN (0x0001)false
                            Nov 23, 2024 06:57:16.117265940 CET1.1.1.1192.168.2.80x9998No error (0)championsleague24.duckdns.org180.19.180.122A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:00:53:44
                            Start date:23/11/2024
                            Path:C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe"
                            Imagebase:0x400000
                            File size:494'592 bytes
                            MD5 hash:0A5EF4CE865711C55BBD9E3BA61BCD4F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000000.1650010605.0000000000459000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.4%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:24.1%
                              Total number of Nodes:1173
                              Total number of Limit Nodes:50
                              execution_graph 47196 43bea8 47199 43beb4 _swprintf CallCatchBlock 47196->47199 47197 43bec2 47212 44062d 20 API calls _abort 47197->47212 47199->47197 47200 43beec 47199->47200 47207 445909 EnterCriticalSection 47200->47207 47202 43bec7 ___std_exception_copy CallCatchBlock 47203 43bef7 47208 43bf98 47203->47208 47207->47203 47209 43bfa6 47208->47209 47211 43bf02 47209->47211 47214 4497ec 37 API calls 2 library calls 47209->47214 47213 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 47211->47213 47212->47202 47213->47202 47214->47209 47215 434918 47216 434924 CallCatchBlock 47215->47216 47242 434627 47216->47242 47218 43492b 47220 434954 47218->47220 47540 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47218->47540 47228 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47220->47228 47541 4442d2 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47220->47541 47222 43496d 47224 434973 CallCatchBlock 47222->47224 47542 444276 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 47222->47542 47225 4349f3 47253 434ba5 47225->47253 47228->47225 47543 443487 36 API calls 5 library calls 47228->47543 47235 434a15 47236 434a1f 47235->47236 47545 4434bf 28 API calls _abort 47235->47545 47238 434a28 47236->47238 47546 443462 28 API calls _abort 47236->47546 47547 43479e 13 API calls 2 library calls 47238->47547 47241 434a30 47241->47224 47243 434630 47242->47243 47548 434cb6 IsProcessorFeaturePresent 47243->47548 47245 43463c 47549 438fb1 10 API calls 4 library calls 47245->47549 47247 434641 47248 434645 47247->47248 47550 44415f IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47247->47550 47248->47218 47250 43464e 47251 43465c 47250->47251 47551 438fda 8 API calls 3 library calls 47250->47551 47251->47218 47552 436f10 47253->47552 47256 4349f9 47257 444223 47256->47257 47554 44f0d9 47257->47554 47259 44422c 47260 434a02 47259->47260 47558 446895 36 API calls 47259->47558 47262 40ea00 47260->47262 47560 41cbe1 LoadLibraryA GetProcAddress 47262->47560 47264 40ea1c GetModuleFileNameW 47565 40f3fe 47264->47565 47266 40ea38 47580 4020f6 47266->47580 47269 4020f6 28 API calls 47270 40ea56 47269->47270 47586 41beac 47270->47586 47274 40ea68 47612 401e8d 47274->47612 47276 40ea71 47277 40ea84 47276->47277 47278 40eace 47276->47278 47880 40fbee 118 API calls 47277->47880 47618 401e65 47278->47618 47281 40eade 47285 401e65 22 API calls 47281->47285 47282 40ea96 47283 401e65 22 API calls 47282->47283 47284 40eaa2 47283->47284 47881 410f72 36 API calls __EH_prolog 47284->47881 47286 40eafd 47285->47286 47623 40531e 47286->47623 47289 40eb0c 47628 406383 47289->47628 47290 40eab4 47882 40fb9f 78 API calls 47290->47882 47294 40eabd 47883 40f3eb 71 API calls 47294->47883 47299 401fd8 11 API calls 47302 40ef36 47299->47302 47301 401fd8 11 API calls 47303 40eb36 47301->47303 47544 443396 GetModuleHandleW 47302->47544 47304 401e65 22 API calls 47303->47304 47305 40eb3f 47304->47305 47645 401fc0 47305->47645 47307 40eb4a 47308 401e65 22 API calls 47307->47308 47309 40eb63 47308->47309 47310 401e65 22 API calls 47309->47310 47311 40eb7e 47310->47311 47312 40ebe9 47311->47312 47884 406c59 47311->47884 47314 401e65 22 API calls 47312->47314 47318 40ebf6 47314->47318 47315 40ebab 47316 401fe2 28 API calls 47315->47316 47317 40ebb7 47316->47317 47320 401fd8 11 API calls 47317->47320 47319 40ec3d 47318->47319 47324 413584 3 API calls 47318->47324 47649 40d0a4 47319->47649 47321 40ebc0 47320->47321 47889 413584 RegOpenKeyExA 47321->47889 47323 40ec43 47325 40eac6 47323->47325 47652 41b354 47323->47652 47331 40ec21 47324->47331 47325->47299 47329 40ec5e 47332 40ecb1 47329->47332 47669 407751 47329->47669 47330 40f38a 47965 4139e4 30 API calls 47330->47965 47331->47319 47892 4139e4 30 API calls 47331->47892 47334 401e65 22 API calls 47332->47334 47337 40ecba 47334->47337 47347 40ecc6 47337->47347 47348 40eccb 47337->47348 47339 40f3a0 47966 4124b0 65 API calls ___scrt_fastfail 47339->47966 47341 40ec87 47343 401e65 22 API calls 47341->47343 47342 40ec7d 47893 407773 30 API calls 47342->47893 47356 40ec90 47343->47356 47344 40f3aa 47346 41bcef 28 API calls 47344->47346 47351 40f3ba 47346->47351 47896 407790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47347->47896 47350 401e65 22 API calls 47348->47350 47349 40ec82 47894 40729b 98 API calls 47349->47894 47354 40ecd4 47350->47354 47778 413a5e RegOpenKeyExW 47351->47778 47673 41bcef 47354->47673 47356->47332 47360 40ecac 47356->47360 47357 40ecdf 47677 401f13 47357->47677 47895 40729b 98 API calls 47360->47895 47364 401f09 11 API calls 47366 40f3d7 47364->47366 47368 401f09 11 API calls 47366->47368 47370 40f3e0 47368->47370 47369 401e65 22 API calls 47371 40ecfc 47369->47371 47781 40dd7d 47370->47781 47375 401e65 22 API calls 47371->47375 47377 40ed16 47375->47377 47376 40f3ea 47378 401e65 22 API calls 47377->47378 47379 40ed30 47378->47379 47380 401e65 22 API calls 47379->47380 47381 40ed49 47380->47381 47382 40edb6 47381->47382 47383 401e65 22 API calls 47381->47383 47384 40edc5 47382->47384 47390 40ef41 ___scrt_fastfail 47382->47390 47388 40ed5e _wcslen 47383->47388 47385 40edce 47384->47385 47413 40ee4a ___scrt_fastfail 47384->47413 47386 401e65 22 API calls 47385->47386 47387 40edd7 47386->47387 47389 401e65 22 API calls 47387->47389 47388->47382 47391 401e65 22 API calls 47388->47391 47392 40ede9 47389->47392 47957 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47390->47957 47393 40ed79 47391->47393 47395 401e65 22 API calls 47392->47395 47396 401e65 22 API calls 47393->47396 47397 40edfb 47395->47397 47398 40ed8e 47396->47398 47401 401e65 22 API calls 47397->47401 47897 40da6f 47398->47897 47399 40ef8c 47400 401e65 22 API calls 47399->47400 47402 40efb1 47400->47402 47404 40ee24 47401->47404 47699 402093 47402->47699 47407 401e65 22 API calls 47404->47407 47406 401f13 28 API calls 47409 40edad 47406->47409 47410 40ee35 47407->47410 47412 401f09 11 API calls 47409->47412 47955 40ce34 46 API calls _wcslen 47410->47955 47411 40efc3 47705 4137aa RegCreateKeyA 47411->47705 47412->47382 47689 413982 47413->47689 47417 40eede ctype 47422 401e65 22 API calls 47417->47422 47418 40ee45 47418->47413 47420 401e65 22 API calls 47421 40efe5 47420->47421 47711 43bb2c 47421->47711 47423 40eef5 47422->47423 47423->47399 47427 40ef09 47423->47427 47426 40effc 47958 41ce2c 88 API calls ___scrt_fastfail 47426->47958 47429 401e65 22 API calls 47427->47429 47428 40f01f 47433 402093 28 API calls 47428->47433 47431 40ef12 47429->47431 47434 41bcef 28 API calls 47431->47434 47432 40f003 CreateThread 47432->47428 48679 41d4ee 10 API calls 47432->48679 47435 40f034 47433->47435 47436 40ef1e 47434->47436 47437 402093 28 API calls 47435->47437 47956 40f4af 107 API calls 47436->47956 47439 40f043 47437->47439 47715 41b580 47439->47715 47440 40ef23 47440->47399 47442 40ef2a 47440->47442 47442->47325 47444 401e65 22 API calls 47445 40f054 47444->47445 47446 401e65 22 API calls 47445->47446 47447 40f066 47446->47447 47448 401e65 22 API calls 47447->47448 47449 40f086 47448->47449 47450 43bb2c _strftime 40 API calls 47449->47450 47451 40f093 47450->47451 47452 401e65 22 API calls 47451->47452 47453 40f09e 47452->47453 47454 401e65 22 API calls 47453->47454 47455 40f0af 47454->47455 47456 401e65 22 API calls 47455->47456 47457 40f0c4 47456->47457 47458 401e65 22 API calls 47457->47458 47459 40f0d5 47458->47459 47460 40f0dc StrToIntA 47459->47460 47739 409e1f 47460->47739 47463 401e65 22 API calls 47464 40f0f7 47463->47464 47465 40f103 47464->47465 47466 40f13c 47464->47466 47959 43455e 22 API calls 3 library calls 47465->47959 47469 401e65 22 API calls 47466->47469 47468 40f10c 47470 401e65 22 API calls 47468->47470 47471 40f14c 47469->47471 47472 40f11f 47470->47472 47473 40f194 47471->47473 47474 40f158 47471->47474 47475 40f126 CreateThread 47472->47475 47477 401e65 22 API calls 47473->47477 47960 43455e 22 API calls 3 library calls 47474->47960 47475->47466 48677 41a045 110 API calls 2 library calls 47475->48677 47479 40f19d 47477->47479 47478 40f161 47480 401e65 22 API calls 47478->47480 47482 40f207 47479->47482 47483 40f1a9 47479->47483 47481 40f173 47480->47481 47484 40f17a CreateThread 47481->47484 47485 401e65 22 API calls 47482->47485 47486 401e65 22 API calls 47483->47486 47484->47473 48682 41a045 110 API calls 2 library calls 47484->48682 47487 40f210 47485->47487 47488 40f1b9 47486->47488 47489 40f255 47487->47489 47490 40f21c 47487->47490 47491 401e65 22 API calls 47488->47491 47764 41b69e GetComputerNameExW GetUserNameW 47489->47764 47492 401e65 22 API calls 47490->47492 47493 40f1ce 47491->47493 47495 40f225 47492->47495 47961 40da23 32 API calls 47493->47961 47501 401e65 22 API calls 47495->47501 47497 401f13 28 API calls 47498 40f269 47497->47498 47500 401f09 11 API calls 47498->47500 47503 40f272 47500->47503 47504 40f23a 47501->47504 47502 40f1e1 47505 401f13 28 API calls 47502->47505 47506 40f27b SetProcessDEPPolicy 47503->47506 47507 40f27e CreateThread 47503->47507 47514 43bb2c _strftime 40 API calls 47504->47514 47508 40f1ed 47505->47508 47506->47507 47509 40f293 CreateThread 47507->47509 47510 40f29f 47507->47510 48650 40f7e2 47507->48650 47511 401f09 11 API calls 47508->47511 47509->47510 48678 412132 139 API calls 47509->48678 47512 40f2b4 47510->47512 47513 40f2a8 CreateThread 47510->47513 47515 40f1f6 CreateThread 47511->47515 47517 40f307 47512->47517 47519 402093 28 API calls 47512->47519 47513->47512 48680 412716 38 API calls ___scrt_fastfail 47513->48680 47516 40f247 47514->47516 47515->47482 48681 401a6d 50 API calls _strftime 47515->48681 47962 40c19d 7 API calls 47516->47962 47775 41353a RegOpenKeyExA 47517->47775 47520 40f2d7 47519->47520 47963 4052fd 28 API calls 47520->47963 47526 40f328 47528 41bcef 28 API calls 47526->47528 47530 40f338 47528->47530 47964 413656 31 API calls 47530->47964 47534 40f34e 47535 401f09 11 API calls 47534->47535 47538 40f359 47535->47538 47536 40f381 DeleteFileW 47537 40f388 47536->47537 47536->47538 47537->47344 47538->47344 47538->47536 47539 40f36f Sleep 47538->47539 47539->47538 47540->47218 47541->47222 47542->47228 47543->47225 47544->47235 47545->47236 47546->47238 47547->47241 47548->47245 47549->47247 47550->47250 47551->47248 47553 434bb8 GetStartupInfoW 47552->47553 47553->47256 47555 44f0eb 47554->47555 47556 44f0e2 47554->47556 47555->47259 47559 44efd8 49 API calls 4 library calls 47556->47559 47558->47259 47559->47555 47561 41cc20 LoadLibraryA GetProcAddress 47560->47561 47562 41cc10 GetModuleHandleA GetProcAddress 47560->47562 47563 41cc49 44 API calls 47561->47563 47564 41cc39 LoadLibraryA GetProcAddress 47561->47564 47562->47561 47563->47264 47564->47563 47967 41b539 FindResourceA 47565->47967 47569 40f428 ctype 47977 4020b7 47569->47977 47572 401fe2 28 API calls 47573 40f44e 47572->47573 47574 401fd8 11 API calls 47573->47574 47575 40f457 47574->47575 47576 43bda0 _Yarn 21 API calls 47575->47576 47577 40f468 ctype 47576->47577 47983 406e13 47577->47983 47579 40f49b 47579->47266 47581 40210c 47580->47581 47582 4023ce 11 API calls 47581->47582 47583 402126 47582->47583 47584 402569 28 API calls 47583->47584 47585 402134 47584->47585 47585->47269 48020 4020df 47586->48020 47588 41bf2f 47589 401fd8 11 API calls 47588->47589 47590 41bf61 47589->47590 47591 401fd8 11 API calls 47590->47591 47593 41bf69 47591->47593 47592 41bf31 48026 4041a2 28 API calls 47592->48026 47596 401fd8 11 API calls 47593->47596 47599 40ea5f 47596->47599 47597 41bf3d 47600 401fe2 28 API calls 47597->47600 47598 401fe2 28 API calls 47607 41bebf 47598->47607 47608 40fb52 47599->47608 47601 41bf46 47600->47601 47602 401fd8 11 API calls 47601->47602 47604 41bf4e 47602->47604 47603 401fd8 11 API calls 47603->47607 48027 41cec5 28 API calls 47604->48027 47607->47588 47607->47592 47607->47598 47607->47603 48024 4041a2 28 API calls 47607->48024 48025 41cec5 28 API calls 47607->48025 47609 40fb5e 47608->47609 47611 40fb65 47608->47611 48028 402163 11 API calls 47609->48028 47611->47274 47613 402163 47612->47613 47617 40219f 47613->47617 48029 402730 11 API calls 47613->48029 47615 402184 48030 402712 11 API calls std::_Deallocate 47615->48030 47617->47276 47619 401e6d 47618->47619 47622 401e75 47619->47622 48031 402158 22 API calls 47619->48031 47622->47281 47624 4020df 11 API calls 47623->47624 47625 40532a 47624->47625 48032 4032a0 47625->48032 47627 405346 47627->47289 48037 4051ef 47628->48037 47630 406391 48041 402055 47630->48041 47633 401fe2 47634 401ff1 47633->47634 47641 402039 47633->47641 47635 4023ce 11 API calls 47634->47635 47636 401ffa 47635->47636 47637 40203c 47636->47637 47638 402015 47636->47638 47639 40267a 11 API calls 47637->47639 48075 403098 28 API calls 47638->48075 47639->47641 47642 401fd8 47641->47642 47643 4023ce 11 API calls 47642->47643 47644 401fe1 47643->47644 47644->47301 47646 401fd2 47645->47646 47647 401fc9 47645->47647 47646->47307 48076 4025e0 28 API calls 47647->48076 48077 401fab 47649->48077 47651 40d0ae CreateMutexA GetLastError 47651->47323 48078 41c048 47652->48078 47657 401fe2 28 API calls 47658 41b390 47657->47658 47659 401fd8 11 API calls 47658->47659 47660 41b398 47659->47660 47661 4135e1 31 API calls 47660->47661 47663 41b3ee 47660->47663 47662 41b3c1 47661->47662 47664 41b3cc StrToIntA 47662->47664 47663->47329 47665 41b3e3 47664->47665 47666 41b3da 47664->47666 47667 401fd8 11 API calls 47665->47667 48087 41cffa 22 API calls 47666->48087 47667->47663 47670 407765 47669->47670 47671 413584 3 API calls 47670->47671 47672 40776c 47671->47672 47672->47341 47672->47342 47674 41bd03 47673->47674 48088 40b93f 47674->48088 47676 41bd0b 47676->47357 47678 401f22 47677->47678 47685 401f6a 47677->47685 47679 402252 11 API calls 47678->47679 47680 401f2b 47679->47680 47681 401f6d 47680->47681 47682 401f46 47680->47682 48121 402336 47681->48121 48120 40305c 28 API calls 47682->48120 47686 401f09 47685->47686 47687 402252 11 API calls 47686->47687 47688 401f12 47687->47688 47688->47369 47690 4139a0 47689->47690 47691 406e13 28 API calls 47690->47691 47692 4139b5 47691->47692 47693 4020f6 28 API calls 47692->47693 47694 4139c5 47693->47694 47695 4137aa 14 API calls 47694->47695 47696 4139cf 47695->47696 47697 401fd8 11 API calls 47696->47697 47698 4139dc 47697->47698 47698->47417 47700 40209b 47699->47700 47701 4023ce 11 API calls 47700->47701 47702 4020a6 47701->47702 48125 4024ed 47702->48125 47706 4137fa 47705->47706 47707 4137c3 47705->47707 47708 401fd8 11 API calls 47706->47708 47710 4137d5 RegSetValueExA RegCloseKey 47707->47710 47709 40efd9 47708->47709 47709->47420 47710->47706 47712 43bb45 _strftime 47711->47712 48129 43ae83 47712->48129 47714 40eff2 47714->47426 47714->47428 47716 41b631 47715->47716 47717 41b596 GetLocalTime 47715->47717 47718 401fd8 11 API calls 47716->47718 47719 40531e 28 API calls 47717->47719 47721 41b639 47718->47721 47720 41b5d8 47719->47720 47722 406383 28 API calls 47720->47722 47723 401fd8 11 API calls 47721->47723 47724 41b5e4 47722->47724 47725 40f048 47723->47725 48157 402f10 47724->48157 47725->47444 47728 406383 28 API calls 47729 41b5fc 47728->47729 48162 40723b 77 API calls 47729->48162 47731 41b60a 47732 401fd8 11 API calls 47731->47732 47733 41b616 47732->47733 47734 401fd8 11 API calls 47733->47734 47735 41b61f 47734->47735 47736 401fd8 11 API calls 47735->47736 47737 41b628 47736->47737 47738 401fd8 11 API calls 47737->47738 47738->47716 47740 409e3d _wcslen 47739->47740 47741 409e48 47740->47741 47742 409e5f 47740->47742 47744 40da6f 32 API calls 47741->47744 47743 40da6f 32 API calls 47742->47743 47745 409e67 47743->47745 47746 409e50 47744->47746 47747 401f13 28 API calls 47745->47747 47748 401f13 28 API calls 47746->47748 47749 409e75 47747->47749 47750 409e5a 47748->47750 47751 401f09 11 API calls 47749->47751 47752 401f09 11 API calls 47750->47752 47753 409e7d 47751->47753 47754 409eb4 47752->47754 48181 409196 28 API calls 47753->48181 48166 40a144 47754->48166 47757 409e8f 48182 403014 47757->48182 47761 401f13 28 API calls 47762 409ea4 47761->47762 47763 401f09 11 API calls 47762->47763 47763->47750 48385 40417e 47764->48385 47769 403014 28 API calls 47770 41b703 47769->47770 47771 401f09 11 API calls 47770->47771 47772 41b70c 47771->47772 47773 401f09 11 API calls 47772->47773 47774 40f25e 47773->47774 47774->47497 47776 41355b RegQueryValueExA RegCloseKey 47775->47776 47777 40f31f 47775->47777 47776->47777 47777->47370 47777->47526 47779 40f3cd 47778->47779 47780 413a7a RegDeleteValueW 47778->47780 47779->47364 47780->47779 47782 40dd96 47781->47782 47783 41353a 3 API calls 47782->47783 47784 40dd9d 47783->47784 47785 40ddbc 47784->47785 48479 401707 47784->48479 47789 414f65 47785->47789 47787 40ddaa 48482 4138b2 RegCreateKeyA 47787->48482 47790 4020df 11 API calls 47789->47790 47791 414f79 47790->47791 48496 41b944 47791->48496 47794 4020df 11 API calls 47795 414f8f 47794->47795 47796 401e65 22 API calls 47795->47796 47797 414f9d 47796->47797 47798 43bb2c _strftime 40 API calls 47797->47798 47799 414faa 47798->47799 47800 414fbc 47799->47800 47801 414faf Sleep 47799->47801 47802 402093 28 API calls 47800->47802 47801->47800 47803 414fcb 47802->47803 47804 401e65 22 API calls 47803->47804 47805 414fd4 47804->47805 47806 4020f6 28 API calls 47805->47806 47807 414fdf 47806->47807 47808 41beac 28 API calls 47807->47808 47809 414fe7 47808->47809 48500 40489e WSAStartup 47809->48500 47811 414ff1 47812 401e65 22 API calls 47811->47812 47813 414ffa 47812->47813 47814 401e65 22 API calls 47813->47814 47840 415079 47813->47840 47815 415013 47814->47815 47816 401e65 22 API calls 47815->47816 47818 415024 47816->47818 47817 4020f6 28 API calls 47817->47840 47820 401e65 22 API calls 47818->47820 47819 41beac 28 API calls 47819->47840 47821 415035 47820->47821 47823 401e65 22 API calls 47821->47823 47822 406c59 28 API calls 47822->47840 47824 415046 47823->47824 47826 401e65 22 API calls 47824->47826 47825 401fe2 28 API calls 47825->47840 47827 415057 47826->47827 47828 401e65 22 API calls 47827->47828 47830 415069 47828->47830 47829 401fd8 11 API calls 47829->47840 48602 40473d 89 API calls 47830->48602 47832 406383 28 API calls 47832->47840 47833 401e65 22 API calls 47833->47840 47835 4151c7 WSAGetLastError 48603 41cb72 30 API calls 47835->48603 47840->47817 47840->47819 47840->47822 47840->47825 47840->47829 47840->47832 47840->47833 47840->47835 47842 41b580 80 API calls 47840->47842 47844 40531e 28 API calls 47840->47844 47845 401e8d 11 API calls 47840->47845 47846 43bb2c _strftime 40 API calls 47840->47846 47848 402f10 28 API calls 47840->47848 47849 402093 28 API calls 47840->47849 47852 409097 28 API calls 47840->47852 47855 4135e1 31 API calls 47840->47855 47861 4153f6 47840->47861 48501 414f24 47840->48501 48506 40482d 47840->48506 48513 404f51 47840->48513 48528 4048c8 connect 47840->48528 48588 404e26 WaitForSingleObject 47840->48588 48604 4052fd 28 API calls 47840->48604 48605 41b871 GlobalMemoryStatusEx 47840->48605 48606 4145f8 51 API calls 47840->48606 48607 441ed1 20 API calls 47840->48607 48608 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47840->48608 47842->47840 47844->47840 47845->47840 47847 415b0a Sleep 47846->47847 47847->47840 47848->47840 47849->47840 47852->47840 47855->47840 47856 40417e 28 API calls 47856->47861 47859 41bdaf 28 API calls 47859->47861 47860 41bc1f 28 API calls 47860->47861 47861->47840 47861->47856 47861->47859 47861->47860 47862 401e65 22 API calls 47861->47862 47869 402ea1 28 API calls 47861->47869 47870 406383 28 API calls 47861->47870 47871 402f10 28 API calls 47861->47871 47873 401fd8 11 API calls 47861->47873 47876 402093 28 API calls 47861->47876 47877 41b580 80 API calls 47861->47877 47878 415aac CreateThread 47861->47878 47879 401f09 11 API calls 47861->47879 48609 40ddc4 6 API calls 47861->48609 48610 41bcd3 28 API calls 47861->48610 48612 41bb77 GetLastInputInfo GetTickCount 47861->48612 48613 41bb27 30 API calls ___scrt_fastfail 47861->48613 48614 40f90c 29 API calls 47861->48614 48615 402f31 28 API calls 47861->48615 48616 404aa1 61 API calls ctype 47861->48616 48617 404c10 113 API calls _Yarn 47861->48617 48618 40b08c 85 API calls 47861->48618 47863 415474 GetTickCount 47862->47863 48611 41bc1f 28 API calls 47863->48611 47869->47861 47870->47861 47871->47861 47873->47861 47876->47861 47877->47861 47878->47861 48643 41ada8 105 API calls 47878->48643 47879->47861 47880->47282 47881->47290 47882->47294 47885 4020df 11 API calls 47884->47885 47886 406c65 47885->47886 47887 4032a0 28 API calls 47886->47887 47888 406c82 47887->47888 47888->47315 47890 4135ae RegQueryValueExA RegCloseKey 47889->47890 47891 40ebdf 47889->47891 47890->47891 47891->47312 47891->47330 47892->47319 47893->47349 47894->47341 47895->47332 47896->47348 47898 401f86 11 API calls 47897->47898 47899 40da8b 47898->47899 47900 40dae0 47899->47900 47901 40daab 47899->47901 47902 40daa1 47899->47902 47903 41c048 2 API calls 47900->47903 48644 41b645 29 API calls 47901->48644 47905 40dbd4 GetLongPathNameW 47902->47905 47906 40dae5 47903->47906 47908 40417e 28 API calls 47905->47908 47910 40dae9 47906->47910 47911 40db3b 47906->47911 47907 40dab4 47912 401f13 28 API calls 47907->47912 47909 40dbe9 47908->47909 47913 40417e 28 API calls 47909->47913 47915 40417e 28 API calls 47910->47915 47914 40417e 28 API calls 47911->47914 47916 40dabe 47912->47916 47917 40dbf8 47913->47917 47918 40db49 47914->47918 47919 40daf7 47915->47919 47921 401f09 11 API calls 47916->47921 48647 40de0c 28 API calls 47917->48647 47924 40417e 28 API calls 47918->47924 47925 40417e 28 API calls 47919->47925 47921->47902 47922 40dc0b 48648 402fa5 28 API calls 47922->48648 47927 40db5f 47924->47927 47928 40db0d 47925->47928 47926 40dc16 48649 402fa5 28 API calls 47926->48649 48646 402fa5 28 API calls 47927->48646 48645 402fa5 28 API calls 47928->48645 47932 40dc20 47935 401f09 11 API calls 47932->47935 47933 40db6a 47936 401f13 28 API calls 47933->47936 47934 40db18 47937 401f13 28 API calls 47934->47937 47938 40dc2a 47935->47938 47939 40db75 47936->47939 47940 40db23 47937->47940 47941 401f09 11 API calls 47938->47941 47942 401f09 11 API calls 47939->47942 47943 401f09 11 API calls 47940->47943 47944 40dc33 47941->47944 47945 40db7e 47942->47945 47946 40db2c 47943->47946 47948 401f09 11 API calls 47944->47948 47949 401f09 11 API calls 47945->47949 47947 401f09 11 API calls 47946->47947 47947->47916 47950 40dc3c 47948->47950 47949->47916 47951 401f09 11 API calls 47950->47951 47952 40dc45 47951->47952 47953 401f09 11 API calls 47952->47953 47954 40dc4e 47953->47954 47954->47406 47955->47418 47956->47440 47957->47399 47958->47432 47959->47468 47960->47478 47961->47502 47962->47489 47964->47534 47965->47339 47968 41b556 LoadResource LockResource SizeofResource 47967->47968 47969 40f419 47967->47969 47968->47969 47970 43bda0 47969->47970 47975 4461b8 __Getctype 47970->47975 47971 4461f6 47987 44062d 20 API calls _abort 47971->47987 47972 4461e1 RtlAllocateHeap 47974 4461f4 47972->47974 47972->47975 47974->47569 47975->47971 47975->47972 47986 443001 7 API calls 2 library calls 47975->47986 47978 4020bf 47977->47978 47988 4023ce 47978->47988 47980 4020ca 47992 40250a 47980->47992 47982 4020d9 47982->47572 47984 4020b7 28 API calls 47983->47984 47985 406e27 47984->47985 47985->47579 47986->47975 47987->47974 47989 402428 47988->47989 47990 4023d8 47988->47990 47989->47980 47990->47989 47999 4027a7 11 API calls std::_Deallocate 47990->47999 47993 40251a 47992->47993 47994 402520 47993->47994 47995 402535 47993->47995 48000 402569 47994->48000 48010 4028e8 28 API calls 47995->48010 47998 402533 47998->47982 47999->47989 48011 402888 48000->48011 48002 40257d 48003 402592 48002->48003 48004 4025a7 48002->48004 48016 402a34 22 API calls 48003->48016 48018 4028e8 28 API calls 48004->48018 48007 40259b 48017 4029da 22 API calls 48007->48017 48009 4025a5 48009->47998 48010->47998 48012 402890 48011->48012 48013 402898 48012->48013 48019 402ca3 22 API calls 48012->48019 48013->48002 48016->48007 48017->48009 48018->48009 48021 4020e7 48020->48021 48022 4023ce 11 API calls 48021->48022 48023 4020f2 48022->48023 48023->47607 48024->47607 48025->47607 48026->47597 48027->47588 48028->47611 48029->47615 48030->47617 48033 4032aa 48032->48033 48035 4032c9 48033->48035 48036 4028e8 28 API calls 48033->48036 48035->47627 48036->48035 48038 4051fb 48037->48038 48047 405274 48038->48047 48040 405208 48040->47630 48042 402061 48041->48042 48043 4023ce 11 API calls 48042->48043 48044 40207b 48043->48044 48071 40267a 48044->48071 48048 405282 48047->48048 48049 405288 48048->48049 48050 40529e 48048->48050 48058 4025f0 48049->48058 48052 4052f5 48050->48052 48053 4052b6 48050->48053 48068 4028a4 22 API calls 48052->48068 48057 40529c 48053->48057 48067 4028e8 28 API calls 48053->48067 48057->48040 48059 402888 22 API calls 48058->48059 48060 402602 48059->48060 48061 402672 48060->48061 48062 402629 48060->48062 48070 4028a4 22 API calls 48061->48070 48066 40263b 48062->48066 48069 4028e8 28 API calls 48062->48069 48066->48057 48067->48057 48069->48066 48072 40268b 48071->48072 48073 4023ce 11 API calls 48072->48073 48074 40208d 48073->48074 48074->47633 48075->47641 48076->47646 48079 41b362 48078->48079 48080 41c055 GetCurrentProcess IsWow64Process 48078->48080 48082 4135e1 RegOpenKeyExA 48079->48082 48080->48079 48081 41c06c 48080->48081 48081->48079 48083 41360f RegQueryValueExA RegCloseKey 48082->48083 48084 413639 48082->48084 48083->48084 48085 402093 28 API calls 48084->48085 48086 41364e 48085->48086 48086->47657 48087->47665 48089 40b947 48088->48089 48094 402252 48089->48094 48091 40b952 48098 40b967 48091->48098 48093 40b961 48093->47676 48095 4022ac 48094->48095 48096 40225c 48094->48096 48095->48091 48096->48095 48105 402779 11 API calls std::_Deallocate 48096->48105 48099 40b9a1 48098->48099 48100 40b973 48098->48100 48117 4028a4 22 API calls 48099->48117 48106 4027e6 48100->48106 48104 40b97d 48104->48093 48105->48095 48107 4027ef 48106->48107 48108 402851 48107->48108 48109 4027f9 48107->48109 48119 4028a4 22 API calls 48108->48119 48112 402802 48109->48112 48114 402815 48109->48114 48118 402aea 28 API calls __EH_prolog 48112->48118 48115 402813 48114->48115 48116 402252 11 API calls 48114->48116 48115->48104 48116->48115 48118->48115 48120->47685 48122 402347 48121->48122 48123 402252 11 API calls 48122->48123 48124 4023c7 48123->48124 48124->47685 48126 4024f9 48125->48126 48127 40250a 28 API calls 48126->48127 48128 4020b1 48127->48128 48128->47411 48145 43ba8a 48129->48145 48131 43aed0 48151 43a837 36 API calls 3 library calls 48131->48151 48133 43ae95 48133->48131 48134 43aeaa 48133->48134 48136 43aeaf ___std_exception_copy 48133->48136 48150 44062d 20 API calls _abort 48134->48150 48136->47714 48138 43aedc 48140 43af0b 48138->48140 48152 43bacf 40 API calls __Toupper 48138->48152 48142 43af77 48140->48142 48153 43ba36 20 API calls 2 library calls 48140->48153 48154 43ba36 20 API calls 2 library calls 48142->48154 48143 43b03e _strftime 48143->48136 48155 44062d 20 API calls _abort 48143->48155 48146 43baa2 48145->48146 48147 43ba8f 48145->48147 48146->48133 48156 44062d 20 API calls _abort 48147->48156 48149 43ba94 ___std_exception_copy 48149->48133 48150->48136 48151->48138 48152->48138 48153->48142 48154->48143 48155->48136 48156->48149 48163 401fb0 48157->48163 48159 402f1e 48160 402055 11 API calls 48159->48160 48161 402f2d 48160->48161 48161->47728 48162->47731 48164 4025f0 28 API calls 48163->48164 48165 401fbd 48164->48165 48165->48159 48167 40a162 48166->48167 48168 413584 3 API calls 48167->48168 48169 40a169 48168->48169 48170 40a197 48169->48170 48171 40a17d 48169->48171 48187 409097 48170->48187 48173 40a182 48171->48173 48174 409ed6 48171->48174 48176 409097 28 API calls 48173->48176 48174->47463 48178 40a190 48176->48178 48215 40a268 29 API calls 48178->48215 48180 40a195 48180->48174 48181->47757 48362 403222 48182->48362 48184 403022 48366 403262 48184->48366 48188 4090ad 48187->48188 48189 402252 11 API calls 48188->48189 48190 4090c7 48189->48190 48216 404267 48190->48216 48192 4090d5 48193 40a1b4 48192->48193 48228 40b927 48193->48228 48196 40a205 48199 402093 28 API calls 48196->48199 48197 40a1dd 48198 402093 28 API calls 48197->48198 48200 40a1e7 48198->48200 48201 40a210 48199->48201 48202 41bcef 28 API calls 48200->48202 48203 402093 28 API calls 48201->48203 48204 40a1f5 48202->48204 48205 40a21f 48203->48205 48232 40b19f 31 API calls _Yarn 48204->48232 48207 41b580 80 API calls 48205->48207 48209 40a224 CreateThread 48207->48209 48208 40a1fc 48210 401fd8 11 API calls 48208->48210 48211 40a24b CreateThread 48209->48211 48212 40a23f CreateThread 48209->48212 48240 40a2b8 48209->48240 48210->48196 48213 401f09 11 API calls 48211->48213 48237 40a2c4 48211->48237 48212->48211 48234 40a2a2 48212->48234 48214 40a25f 48213->48214 48214->48174 48215->48180 48361 40a2ae 163 API calls 48215->48361 48217 402888 22 API calls 48216->48217 48218 40427b 48217->48218 48219 404290 48218->48219 48220 4042a5 48218->48220 48226 4042df 22 API calls 48219->48226 48222 4027e6 28 API calls 48220->48222 48225 4042a3 48222->48225 48223 404299 48227 402c48 22 API calls 48223->48227 48225->48192 48226->48223 48227->48225 48229 40b930 48228->48229 48230 40a1d2 48228->48230 48233 40b9a7 28 API calls 48229->48233 48230->48196 48230->48197 48232->48208 48233->48230 48243 40a2f3 48234->48243 48261 40ad11 48237->48261 48304 40a761 48240->48304 48244 40a30c SetWindowsHookExA 48243->48244 48245 40a36e GetMessageA 48243->48245 48244->48245 48248 40a328 GetLastError 48244->48248 48246 40a380 TranslateMessage DispatchMessageA 48245->48246 48258 40a2ab 48245->48258 48246->48245 48246->48258 48259 41bc1f 28 API calls 48248->48259 48250 40a339 48260 4052fd 28 API calls 48250->48260 48259->48250 48268 40ad1f 48261->48268 48262 40a2cd 48263 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 48265 40b93f 28 API calls 48263->48265 48265->48268 48268->48262 48268->48263 48271 40adbf GetWindowTextW 48268->48271 48274 40add9 48268->48274 48291 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 48268->48291 48292 401f86 48268->48292 48296 434801 23 API calls __onexit 48268->48296 48297 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 48268->48297 48270 41bb77 GetLastInputInfo GetTickCount 48270->48274 48271->48268 48273 401f09 11 API calls 48273->48274 48274->48268 48274->48270 48274->48273 48275 40af17 48274->48275 48276 40b927 28 API calls 48274->48276 48278 40ae84 Sleep 48274->48278 48281 402093 28 API calls 48274->48281 48284 409097 28 API calls 48274->48284 48286 403014 28 API calls 48274->48286 48287 406383 28 API calls 48274->48287 48288 41bcef 28 API calls 48274->48288 48289 40a671 12 API calls 48274->48289 48290 401fd8 11 API calls 48274->48290 48298 40907f 28 API calls 48274->48298 48299 40b19f 31 API calls _Yarn 48274->48299 48300 40b9b7 28 API calls 48274->48300 48301 40b783 40 API calls 2 library calls 48274->48301 48302 441ed1 20 API calls 48274->48302 48303 4052fd 28 API calls 48274->48303 48277 401f09 11 API calls 48275->48277 48276->48274 48277->48262 48278->48274 48281->48274 48284->48274 48286->48274 48287->48274 48288->48274 48289->48274 48290->48274 48293 401f8e 48292->48293 48294 402252 11 API calls 48293->48294 48295 401f99 48294->48295 48295->48268 48296->48268 48297->48268 48298->48274 48299->48274 48300->48274 48301->48274 48302->48274 48305 40a776 Sleep 48304->48305 48323 40a6b0 48305->48323 48307 40a2c1 48308 40a7c7 GetFileAttributesW 48322 40a788 48308->48322 48309 40a7b6 CreateDirectoryW 48309->48322 48310 40a7de SetFileAttributesW 48310->48322 48311 4020df 11 API calls 48311->48322 48313 40a858 PathFileExistsW 48313->48322 48314 401e65 22 API calls 48314->48322 48316 4020b7 28 API calls 48316->48322 48317 40a961 SetFileAttributesW 48317->48322 48318 401fd8 11 API calls 48318->48322 48319 401fe2 28 API calls 48319->48322 48320 406e13 28 API calls 48320->48322 48322->48305 48322->48307 48322->48308 48322->48309 48322->48310 48322->48311 48322->48313 48322->48314 48322->48316 48322->48317 48322->48318 48322->48319 48322->48320 48336 41c482 48322->48336 48346 41c516 CreateFileW 48322->48346 48354 41c583 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 48322->48354 48324 40a75d 48323->48324 48325 40a6c6 48323->48325 48324->48322 48326 40a6e5 CreateFileW 48325->48326 48328 40a728 CloseHandle 48325->48328 48329 40a73a 48325->48329 48330 40a716 48325->48330 48331 40a71d Sleep 48325->48331 48326->48325 48327 40a6f3 GetFileSize 48326->48327 48327->48325 48327->48328 48328->48325 48329->48324 48333 409097 28 API calls 48329->48333 48355 40b117 84 API calls 48330->48355 48331->48328 48334 40a756 48333->48334 48335 40a1b4 124 API calls 48334->48335 48335->48324 48337 41c495 CreateFileW 48336->48337 48339 41c4d2 48337->48339 48340 41c4ce 48337->48340 48341 41c4f2 WriteFile 48339->48341 48342 41c4d9 SetFilePointer 48339->48342 48340->48322 48344 41c505 48341->48344 48345 41c507 CloseHandle 48341->48345 48342->48341 48343 41c4e9 CloseHandle 48342->48343 48343->48340 48344->48345 48345->48340 48347 41c540 GetFileSize 48346->48347 48348 41c53c 48346->48348 48356 40244e 48347->48356 48348->48322 48350 41c554 48351 41c566 ReadFile 48350->48351 48352 41c573 48351->48352 48353 41c575 CloseHandle 48351->48353 48352->48353 48353->48348 48354->48322 48355->48331 48357 402456 48356->48357 48359 402460 48357->48359 48360 402a51 28 API calls 48357->48360 48359->48350 48360->48359 48363 40322e 48362->48363 48372 403618 48363->48372 48365 40323b 48365->48184 48367 40326e 48366->48367 48368 402252 11 API calls 48367->48368 48369 403288 48368->48369 48370 402336 11 API calls 48369->48370 48371 403031 48370->48371 48371->47761 48373 403626 48372->48373 48374 403644 48373->48374 48375 40362c 48373->48375 48377 40365c 48374->48377 48378 40369e 48374->48378 48383 4036a6 28 API calls 48375->48383 48379 403642 48377->48379 48382 4027e6 28 API calls 48377->48382 48384 4028a4 22 API calls 48378->48384 48379->48365 48382->48379 48383->48379 48386 404186 48385->48386 48387 402252 11 API calls 48386->48387 48388 404191 48387->48388 48396 4041bc 48388->48396 48391 4042fc 48407 404353 48391->48407 48393 40430a 48394 403262 11 API calls 48393->48394 48395 404319 48394->48395 48395->47769 48397 4041c8 48396->48397 48400 4041d9 48397->48400 48399 40419c 48399->48391 48401 4041e9 48400->48401 48402 404206 48401->48402 48403 4041ef 48401->48403 48404 4027e6 28 API calls 48402->48404 48405 404267 28 API calls 48403->48405 48406 404204 48404->48406 48405->48406 48406->48399 48408 40435f 48407->48408 48411 404371 48408->48411 48410 40436d 48410->48393 48412 40437f 48411->48412 48413 404385 48412->48413 48414 40439e 48412->48414 48477 4034e6 28 API calls 48413->48477 48415 402888 22 API calls 48414->48415 48416 4043a6 48415->48416 48418 404419 48416->48418 48419 4043bf 48416->48419 48478 4028a4 22 API calls 48418->48478 48422 4027e6 28 API calls 48419->48422 48430 40439c 48419->48430 48422->48430 48430->48410 48477->48430 48485 43ab1a 48479->48485 48483 4138ca RegSetValueExA RegCloseKey 48482->48483 48484 4138f4 48482->48484 48483->48484 48484->47785 48488 43aa9b 48485->48488 48487 40170d 48487->47787 48489 43aaaa 48488->48489 48490 43aabe 48488->48490 48494 44062d 20 API calls _abort 48489->48494 48493 43aaaf __alldvrm ___std_exception_copy 48490->48493 48495 4489d7 11 API calls 2 library calls 48490->48495 48493->48487 48494->48493 48495->48493 48499 41b98a ctype ___scrt_fastfail 48496->48499 48497 402093 28 API calls 48498 414f84 48497->48498 48498->47794 48499->48497 48500->47811 48502 414f33 48501->48502 48503 414f3d getaddrinfo WSASetLastError 48501->48503 48619 414dc1 29 API calls ___std_exception_copy 48502->48619 48503->47840 48505 414f38 48505->48503 48507 404846 socket 48506->48507 48508 404839 48506->48508 48509 404860 CreateEventW 48507->48509 48510 404842 48507->48510 48620 40489e WSAStartup 48508->48620 48509->47840 48510->47840 48512 40483e 48512->48507 48512->48510 48514 404f65 48513->48514 48515 404fea 48513->48515 48516 404f6e 48514->48516 48517 404fc0 CreateEventA CreateThread 48514->48517 48518 404f7d GetLocalTime 48514->48518 48515->47840 48516->48517 48517->48515 48623 405150 48517->48623 48621 41bc1f 28 API calls 48518->48621 48520 404f91 48622 4052fd 28 API calls 48520->48622 48529 404a1b 48528->48529 48530 4048ee 48528->48530 48531 40497e 48529->48531 48532 404a21 WSAGetLastError 48529->48532 48530->48531 48534 40531e 28 API calls 48530->48534 48552 404923 48530->48552 48531->47840 48532->48531 48533 404a31 48532->48533 48535 404a36 48533->48535 48537 404932 48533->48537 48538 40490f 48534->48538 48638 41cb72 30 API calls 48535->48638 48541 402093 28 API calls 48537->48541 48542 402093 28 API calls 48538->48542 48540 40492b 48540->48537 48544 404941 48540->48544 48545 404a80 48541->48545 48546 40491e 48542->48546 48543 404a40 48639 4052fd 28 API calls 48543->48639 48554 404950 48544->48554 48555 404987 48544->48555 48548 402093 28 API calls 48545->48548 48549 41b580 80 API calls 48546->48549 48551 404a8f 48548->48551 48549->48552 48557 41b580 80 API calls 48551->48557 48627 420cf1 27 API calls 48552->48627 48556 402093 28 API calls 48554->48556 48635 421ad1 54 API calls 48555->48635 48560 40495f 48556->48560 48557->48531 48563 402093 28 API calls 48560->48563 48562 40498f 48565 4049c4 48562->48565 48566 404994 48562->48566 48567 40496e 48563->48567 48637 420e97 28 API calls 48565->48637 48570 402093 28 API calls 48566->48570 48571 41b580 80 API calls 48567->48571 48573 4049a3 48570->48573 48574 404973 48571->48574 48572 4049cc 48575 4049f9 CreateEventW CreateEventW 48572->48575 48578 402093 28 API calls 48572->48578 48576 402093 28 API calls 48573->48576 48628 420d31 48574->48628 48575->48531 48577 4049b2 48576->48577 48579 41b580 80 API calls 48577->48579 48581 4049e2 48578->48581 48582 4049b7 48579->48582 48583 402093 28 API calls 48581->48583 48636 421143 52 API calls 48582->48636 48585 4049f1 48583->48585 48586 41b580 80 API calls 48585->48586 48587 4049f6 48586->48587 48587->48575 48589 404e40 SetEvent CloseHandle 48588->48589 48590 404e57 closesocket 48588->48590 48591 404ed8 48589->48591 48592 404e64 48590->48592 48591->47840 48593 404e73 48592->48593 48594 404e7a 48592->48594 48642 4050e4 84 API calls 48593->48642 48596 404e8c WaitForSingleObject 48594->48596 48597 404ece SetEvent CloseHandle 48594->48597 48598 420d31 3 API calls 48596->48598 48597->48591 48599 404e9b SetEvent WaitForSingleObject 48598->48599 48600 420d31 3 API calls 48599->48600 48601 404eb3 SetEvent CloseHandle CloseHandle 48600->48601 48601->48597 48602->47840 48603->47840 48605->47840 48606->47840 48607->47840 48608->47840 48609->47861 48610->47861 48611->47861 48612->47861 48613->47861 48614->47861 48615->47861 48616->47861 48617->47861 48618->47861 48619->48505 48620->48512 48621->48520 48626 40515c 102 API calls 48623->48626 48625 405159 48626->48625 48627->48540 48629 41e7a2 48628->48629 48630 420d39 48628->48630 48631 41e7b0 48629->48631 48640 41d8ec DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48629->48640 48630->48531 48641 41e4d2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48631->48641 48634 41e7b7 48635->48562 48636->48574 48637->48572 48638->48543 48640->48631 48641->48634 48642->48594 48644->47907 48645->47934 48646->47933 48647->47922 48648->47926 48649->47932 48652 40f7fd 48650->48652 48651 413584 3 API calls 48651->48652 48652->48651 48653 40f82f 48652->48653 48654 40f8a1 48652->48654 48656 40f891 Sleep 48652->48656 48655 409097 28 API calls 48653->48655 48653->48656 48659 41bcef 28 API calls 48653->48659 48666 401f09 11 API calls 48653->48666 48668 402093 28 API calls 48653->48668 48672 4137aa 14 API calls 48653->48672 48683 40d0d1 112 API calls ___scrt_fastfail 48653->48683 48684 41384f 14 API calls 48653->48684 48657 409097 28 API calls 48654->48657 48655->48653 48656->48652 48660 40f8ac 48657->48660 48659->48653 48661 41bcef 28 API calls 48660->48661 48662 40f8b8 48661->48662 48685 41384f 14 API calls 48662->48685 48665 40f8cb 48667 401f09 11 API calls 48665->48667 48666->48653 48669 40f8d7 48667->48669 48668->48653 48670 402093 28 API calls 48669->48670 48671 40f8e8 48670->48671 48673 4137aa 14 API calls 48671->48673 48672->48653 48674 40f8fb 48673->48674 48686 41288b TerminateProcess WaitForSingleObject 48674->48686 48676 40f903 ExitProcess 48687 412829 62 API calls 48678->48687 48684->48653 48685->48665 48686->48676 48688 42f97e 48689 42f989 48688->48689 48690 42f99d 48689->48690 48692 432f7f 48689->48692 48693 432f8e 48692->48693 48695 432f8a 48692->48695 48696 440f5d 48693->48696 48695->48690 48697 446206 48696->48697 48698 446213 48697->48698 48699 44621e 48697->48699 48709 4461b8 48698->48709 48701 446226 48699->48701 48708 44622f __Getctype 48699->48708 48716 446802 20 API calls _free 48701->48716 48702 446234 48717 44062d 20 API calls _abort 48702->48717 48703 446259 RtlReAllocateHeap 48706 44621b 48703->48706 48703->48708 48706->48695 48708->48702 48708->48703 48718 443001 7 API calls 2 library calls 48708->48718 48710 4461f6 48709->48710 48711 4461c6 __Getctype 48709->48711 48720 44062d 20 API calls _abort 48710->48720 48711->48710 48712 4461e1 RtlAllocateHeap 48711->48712 48719 443001 7 API calls 2 library calls 48711->48719 48712->48711 48714 4461f4 48712->48714 48714->48706 48716->48706 48717->48706 48718->48708 48719->48711 48720->48714 48721 426cdc 48726 426d59 send 48721->48726 48727 41e04e 48728 41e063 ctype ___scrt_fastfail 48727->48728 48730 432f55 21 API calls 48728->48730 48740 41e266 48728->48740 48734 41e213 ___scrt_fastfail 48730->48734 48731 41e277 48732 41e21a 48731->48732 48742 432f55 48731->48742 48734->48732 48735 432f55 21 API calls 48734->48735 48738 41e240 ___scrt_fastfail 48735->48738 48736 41e2b0 ___scrt_fastfail 48736->48732 48747 4335db 48736->48747 48738->48732 48739 432f55 21 API calls 48738->48739 48739->48740 48740->48732 48741 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 48740->48741 48741->48731 48743 432f63 48742->48743 48744 432f5f 48742->48744 48745 43bda0 _Yarn 21 API calls 48743->48745 48744->48736 48746 432f68 48745->48746 48746->48736 48750 4334fa 48747->48750 48749 4335e3 48749->48732 48751 433513 48750->48751 48755 433509 48750->48755 48752 432f55 21 API calls 48751->48752 48751->48755 48753 433534 48752->48753 48753->48755 48756 4338c8 CryptAcquireContextA 48753->48756 48755->48749 48757 4338e4 48756->48757 48758 4338e9 CryptGenRandom 48756->48758 48757->48755 48758->48757 48759 4338fe CryptReleaseContext 48758->48759 48759->48757 48760 426c6d 48766 426d42 recv 48760->48766

                              Control-flow Graph

                              APIs
                              • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                              • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                              • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                              • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad$HandleModule
                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                              • API String ID: 4236061018-3687161714
                              • Opcode ID: 5fded5d77b72a202610b087cc82529c2f7d7b10a8ab2824fd38dfad8e3bd9f71
                              • Instruction ID: 9b463eec3a0437fb1f175c53e93b0f4db36c95b88d1cb607187732a7b05a7934
                              • Opcode Fuzzy Hash: 5fded5d77b72a202610b087cc82529c2f7d7b10a8ab2824fd38dfad8e3bd9f71
                              • Instruction Fuzzy Hash: E2418BA0E8035879DB207BB65D89E3B3E5CD9857953614837B44C93550EBBCEC408EAE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 48 40ef2d-40ef3e call 401fd8 22->48 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 102 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->102 79 40ec06-40ec25 call 401fab call 413584 70->79 80 40ec3e-40ec45 call 40d0a4 70->80 79->80 98 40ec27-40ec3d call 401fab call 4139e4 79->98 90 40ec47-40ec49 80->90 91 40ec4e-40ec55 80->91 94 40ef2c 90->94 95 40ec57 91->95 96 40ec59-40ec65 call 41b354 91->96 94->48 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 98->80 124 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 102->124 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 129 40ecc6 call 407790 107->129 130 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->130 117 40ec79-40ec7b 108->117 121 40ec87-40ec9a call 401e65 call 401fab 117->121 122 40ec7d-40ec82 call 407773 call 40729b 117->122 121->107 141 40ec9c-40eca2 121->141 122->121 157 40f3e0-40f3ea call 40dd7d call 414f65 124->157 129->130 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 130->177 178 40edbb-40edbf 130->178 141->107 144 40eca4-40ecaa 141->144 144->107 147 40ecac call 40729b 144->147 147->107 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 233 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->233 182 40ee4a-40ee54 call 409092 181->182 183 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->183 192 40ee59-40ee7d call 40247c call 434829 182->192 183->192 213 40ee8c 192->213 214 40ee7f-40ee8a call 436f10 192->214 205->178 216 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 213->216 214->216 271 40eede-40ef03 call 434832 call 401e65 call 40b9f8 216->271 286 40f017-40f019 233->286 287 40effc 233->287 271->233 288 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 271->288 290 40f01b-40f01d 286->290 291 40f01f 286->291 289 40effe-40f015 call 41ce2c CreateThread 287->289 288->233 306 40ef2a 288->306 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 356 40f194-40f1a7 call 401e65 call 401fab 347->356 357 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->357 368 40f207-40f21a call 401e65 call 401fab 356->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 356->369 357->356 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 400 40f27b-40f27c SetProcessDEPPolicy 379->400 401 40f27e-40f291 CreateThread 379->401 380->379 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 426 40f31f-40f322 416->426 418->416 426->157 428 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 426->428 443 40f381-40f386 DeleteFileW 428->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->124 445->124 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                              APIs
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe,00000104), ref: 0040EA29
                                • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                              • String ID: (TG$,aF$,aF$0SG$0SG$Access Level: $Administrator$C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$Exe$Exe$HSG$HSG$Inj$Remcos Agent initialized$Software\$User$`SG$del$del$exepath$licence$license_code.txt$tMG$RG$RG$RG$RG$RG
                              • API String ID: 2830904901-2123605973
                              • Opcode ID: 00e7d04e9eb4a38e59424d944449be319c3e688d20f0a7e0f628b441e47e90e5
                              • Instruction ID: 744eeac4272eceb7f63ef51a6efbfa797c3f505d1bd04c543663c5f487e0f2b9
                              • Opcode Fuzzy Hash: 00e7d04e9eb4a38e59424d944449be319c3e688d20f0a7e0f628b441e47e90e5
                              • Instruction Fuzzy Hash: 7D32D860B043416BDA14B7729C57B6E26994F80748F40483FB9467F2E3EEBD8D45839E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1277 40a2f3-40a30a 1278 40a30c-40a326 SetWindowsHookExA 1277->1278 1279 40a36e-40a37e GetMessageA 1277->1279 1278->1279 1284 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1278->1284 1280 40a380-40a398 TranslateMessage DispatchMessageA 1279->1280 1281 40a39a 1279->1281 1280->1279 1280->1281 1282 40a39c-40a3a1 1281->1282 1284->1282
                              APIs
                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                              • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                              • GetLastError.KERNEL32 ref: 0040A328
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                              • TranslateMessage.USER32(?), ref: 0040A385
                              • DispatchMessageA.USER32(?), ref: 0040A390
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                              • String ID: Keylogger initialization failure: error $`Wu
                              • API String ID: 3219506041-303027793
                              • Opcode ID: ec6ea0f8fe23a749d8e8acf9f7cc52a99e5dbd3939ef256a600925548c7b7f6b
                              • Instruction ID: bc7b44719e59224dfa2ccda8cade24f8ec1ba8a069f7aee67aec650331f950b6
                              • Opcode Fuzzy Hash: ec6ea0f8fe23a749d8e8acf9f7cc52a99e5dbd3939ef256a600925548c7b7f6b
                              • Instruction Fuzzy Hash: 8911C131510301EBC710BB769C0986B77ACEB95715B20097EFC82E22D1FB34C910CBAA

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                • Part of subcall function 00413584: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475300), ref: 004135C2
                                • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                              • Sleep.KERNEL32(00000BB8), ref: 0040F896
                              • ExitProcess.KERNEL32 ref: 0040F905
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseExitOpenProcessQuerySleepValue
                              • String ID: 5.2.0 Pro$override$pth_unenc$RG
                              • API String ID: 2281282204-1448307011
                              • Opcode ID: 06c767dc88a9855e3f533d00c9822b9a078708d344295b310765a6219c2a97ef
                              • Instruction ID: 0454f1d730b8de97e77b6af0221289a353f5645d6d0bcfbcd4472c6607f37e61
                              • Opcode Fuzzy Hash: 06c767dc88a9855e3f533d00c9822b9a078708d344295b310765a6219c2a97ef
                              • Instruction Fuzzy Hash: 7421E171B0420127D6087676885B6AE399A9B80708F50453FF409672D6FF7C8E0483AF

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1427 404f51-404f5f 1428 404f65-404f6c 1427->1428 1429 404fea 1427->1429 1431 404f74-404f7b 1428->1431 1432 404f6e-404f72 1428->1432 1430 404fec-404ff1 1429->1430 1433 404fc0-404fe8 CreateEventA CreateThread 1431->1433 1434 404f7d-404fbb GetLocalTime call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1431->1434 1432->1433 1433->1430 1434->1433
                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 00404F81
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                              • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$EventLocalThreadTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 2532271599-1507639952
                              • Opcode ID: 066d78ba7818bee30ed95e00d6410b7cbfa006029d83974b6d81b45a693dc474
                              • Instruction ID: 4df055e7b18788cc2e6f6b282d58d8d1f041b9f055d7d752625e2c9c7705ec55
                              • Opcode Fuzzy Hash: 066d78ba7818bee30ed95e00d6410b7cbfa006029d83974b6d81b45a693dc474
                              • Instruction Fuzzy Hash: D7110A71900385BAC720A7779C0DEABBFACDBD2714F04046FF54162291D6B89445CBBA
                              APIs
                              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,007C4108), ref: 004338DA
                              • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Crypt$Context$AcquireRandomRelease
                              • String ID:
                              • API String ID: 1815803762-0
                              • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                              • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                              • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                              APIs
                              • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750F4), ref: 0041B6BB
                              • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Name$ComputerUser
                              • String ID:
                              • API String ID: 4229901323-0
                              • Opcode ID: a649893464b8dc9f92fcf892b6f773fc4b962ecf36c796a43829c604b32fbd1e
                              • Instruction ID: 96a0ba9ffe47efa01ac310f3847ceb2d7b3b0148e4494d8e74ae155582b6cc75
                              • Opcode Fuzzy Hash: a649893464b8dc9f92fcf892b6f773fc4b962ecf36c796a43829c604b32fbd1e
                              • Instruction Fuzzy Hash: 9E014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E888BA8
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: recv
                              • String ID:
                              • API String ID: 1507349165-0
                              • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                              • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                              • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                              • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 448 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 461 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 448->461 462 414faf-414fb6 Sleep 448->462 477 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->477 478 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->478 462->461 477->478 531 415127-41512e 478->531 532 415119-415125 478->532 533 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 531->533 532->533 560 415210-41521e call 40482d 533->560 561 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 533->561 567 415220-415246 call 402093 * 2 call 41b580 560->567 568 41524b-415259 call 404f51 call 4048c8 560->568 584 415ade-415af0 call 404e26 call 4021fa 561->584 567->584 580 41525e-415260 568->580 583 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 580->583 580->584 648 4153bb-4153c8 call 405aa6 583->648 649 4153cd-4153f4 call 401fab call 4135e1 583->649 596 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 584->596 597 415b18-415b20 call 401e8d 584->597 596->597 597->478 648->649 655 4153f6-4153f8 649->655 656 4153fb-415a51 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 649->656 655->656 902 415a53-415a5a 656->902 903 415a65-415a6c 656->903 902->903 904 415a5c-415a5e 902->904 905 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 903->905 906 415a6e-415a73 call 40b08c 903->906 904->903 917 415aac-415ab8 CreateThread 905->917 918 415abe-415ad9 call 401fd8 * 2 call 401f09 905->918 906->905 917->918 918->584
                              APIs
                              • Sleep.KERNEL32(00000000,00000029,00475300,004750F4,00000000), ref: 00414FB6
                              • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                              • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$ErrorLastLocalTime
                              • String ID: | $%I64u$,aF$5.2.0 Pro$C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$HSG$TLS Off$TLS On $`SG$hlight$name$tMG$RG
                              • API String ID: 524882891-1049590235
                              • Opcode ID: 8047ca1a71f36cc847b636b543cd174a12322403bb133027b8bd33828fd017c5
                              • Instruction ID: d8c825886b0a0d8326cbfb5c9d4cc5050fd80dde9ad4bcb2ea62c87b00a1b781
                              • Opcode Fuzzy Hash: 8047ca1a71f36cc847b636b543cd174a12322403bb133027b8bd33828fd017c5
                              • Instruction Fuzzy Hash: 03526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                              Control-flow Graph

                              APIs
                              • connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                              • WSAGetLastError.WS2_32 ref: 00404A21
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                              • API String ID: 994465650-2151626615
                              • Opcode ID: 38b3cb5bd10e09c7b3bd40259f36f96c9113b6101ffe131655b2f6876ea9c128
                              • Instruction ID: d7ad8a6a5323ad03425d5def7d05b30a9c8ce31cd4ccd690c712fe6c843f15aa
                              • Opcode Fuzzy Hash: 38b3cb5bd10e09c7b3bd40259f36f96c9113b6101ffe131655b2f6876ea9c128
                              • Instruction Fuzzy Hash: AD41E8B575060277C61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                              Control-flow Graph

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                              • closesocket.WS2_32(000000FF), ref: 00404E5A
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                              • String ID:
                              • API String ID: 3658366068-0
                              • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                              • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                              • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                              • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                              Control-flow Graph

                              APIs
                              • Sleep.KERNEL32(00001388), ref: 0040A77B
                                • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                              • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                              • String ID: 8~$HSG$HSG$xdF
                              • API String ID: 3795512280-1480158595
                              • Opcode ID: 94b06e53037e07a132a44a0c171d15b1bbffd87d4b076595ec05959e5486cbcf
                              • Instruction ID: b4a8632174cffc949347442128fe52ffedc09667b4c22c284aa084888e76bad6
                              • Opcode Fuzzy Hash: 94b06e53037e07a132a44a0c171d15b1bbffd87d4b076595ec05959e5486cbcf
                              • Instruction Fuzzy Hash: AC518D716043015ACB15BB72C866ABE77AA9F80349F00483FF642B71E2DF7C9D09865E

                              Control-flow Graph

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0040AD73
                              • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                              • GetForegroundWindow.USER32 ref: 0040AD84
                              • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                              • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                              • String ID: [${ User has been idle for $ minutes }$]
                              • API String ID: 911427763-3954389425
                              • Opcode ID: f1beafbc65b67ea611c27b04d98e1104d59d3344b0708eb8d40cf24d2962f261
                              • Instruction ID: 1462e2e3b317a3feaa81e481452c264ee2198f2d95b6ea563507fc8e19ff55dc
                              • Opcode Fuzzy Hash: f1beafbc65b67ea611c27b04d98e1104d59d3344b0708eb8d40cf24d2962f261
                              • Instruction Fuzzy Hash: 7F51E1716043419BC714FB62D846AAE7795AF84308F10093FF546A22E2EF7C9D44C69F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1195 40da6f-40da94 call 401f86 1198 40da9a 1195->1198 1199 40dbbe-40dbe4 call 401f04 GetLongPathNameW call 40417e 1195->1199 1200 40dae0-40dae7 call 41c048 1198->1200 1201 40daa1-40daa6 1198->1201 1202 40db93-40db98 1198->1202 1203 40dad6-40dadb 1198->1203 1204 40dba9 1198->1204 1205 40db9a-40db9f call 43c11f 1198->1205 1206 40daab-40dab9 call 41b645 call 401f13 1198->1206 1207 40dacc-40dad1 1198->1207 1208 40db8c-40db91 1198->1208 1220 40dbe9-40dc56 call 40417e call 40de0c call 402fa5 * 2 call 401f09 * 5 1199->1220 1221 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1200->1221 1222 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1200->1222 1210 40dbae-40dbb3 call 43c11f 1201->1210 1202->1210 1203->1210 1204->1210 1216 40dba4-40dba7 1205->1216 1229 40dabe 1206->1229 1207->1210 1208->1210 1223 40dbb4-40dbb9 call 409092 1210->1223 1216->1204 1216->1223 1234 40dac2-40dac7 call 401f09 1221->1234 1222->1229 1223->1199 1229->1234 1234->1199
                              APIs
                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040DBD5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: LongNamePath
                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                              • API String ID: 82841172-425784914
                              • Opcode ID: f4c7df661c5bec9d099b359126bde6595d68bd7cf9e1ce7f7ed169ab2082938e
                              • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                              • Opcode Fuzzy Hash: f4c7df661c5bec9d099b359126bde6595d68bd7cf9e1ce7f7ed169ab2082938e
                              • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1342 41c482-41c493 1343 41c495-41c498 1342->1343 1344 41c4ab-41c4b2 1342->1344 1346 41c4a1-41c4a9 1343->1346 1347 41c49a-41c49f 1343->1347 1345 41c4b3-41c4cc CreateFileW 1344->1345 1348 41c4d2-41c4d7 1345->1348 1349 41c4ce-41c4d0 1345->1349 1346->1345 1347->1345 1351 41c4f2-41c503 WriteFile 1348->1351 1352 41c4d9-41c4e7 SetFilePointer 1348->1352 1350 41c510-41c515 1349->1350 1354 41c505 1351->1354 1355 41c507-41c50e CloseHandle 1351->1355 1352->1351 1353 41c4e9-41c4f0 CloseHandle 1352->1353 1353->1349 1354->1355 1355->1350
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                              • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                              • CloseHandle.KERNEL32(00000000), ref: 0041C508
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreatePointerWrite
                              • String ID: xpF
                              • API String ID: 1852769593-354647465
                              • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                              • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                              • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                              • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1356 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1367 41b3ad-41b3bc call 4135e1 1356->1367 1368 41b3ee-41b3f7 1356->1368 1373 41b3c1-41b3d8 call 401fab StrToIntA 1367->1373 1369 41b400 1368->1369 1370 41b3f9-41b3fe 1368->1370 1372 41b405-41b410 call 40537d 1369->1372 1370->1372 1378 41b3e6-41b3e9 call 401fd8 1373->1378 1379 41b3da-41b3e3 call 41cffa 1373->1379 1378->1368 1379->1378
                              APIs
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                              • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750F4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64
                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                              • API String ID: 782494840-2070987746
                              • Opcode ID: 40b4b818fe30f98410963cd3dc02b2c3b2616f089d502d216bf83757675de9ba
                              • Instruction ID: 99e2d84e4b8fa31c947f893a9fcbf762d6d1118dcb79bce5eaccee633664c5dc
                              • Opcode Fuzzy Hash: 40b4b818fe30f98410963cd3dc02b2c3b2616f089d502d216bf83757675de9ba
                              • Instruction Fuzzy Hash: 0311C47064414926C700F7659C97BFF76198B80304F94453BF806A71D3FB6C598683EE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1383 40a6b0-40a6c0 1384 40a6c6-40a6c8 1383->1384 1385 40a75d-40a760 1383->1385 1386 40a6cb-40a6f1 call 401f04 CreateFileW 1384->1386 1389 40a731 1386->1389 1390 40a6f3-40a701 GetFileSize 1386->1390 1391 40a734-40a738 1389->1391 1392 40a703 1390->1392 1393 40a728-40a72f CloseHandle 1390->1393 1391->1386 1394 40a73a-40a73d 1391->1394 1395 40a705-40a70b 1392->1395 1396 40a70d-40a714 1392->1396 1393->1391 1394->1385 1397 40a73f-40a746 1394->1397 1395->1393 1395->1396 1398 40a716-40a718 call 40b117 1396->1398 1399 40a71d-40a722 Sleep 1396->1399 1397->1385 1400 40a748-40a758 call 409097 call 40a1b4 1397->1400 1398->1399 1399->1393 1400->1385
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                              • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                              • CloseHandle.KERNEL32(00000000,?,?,?,0040A788), ref: 0040A729
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSizeSleep
                              • String ID: hQG
                              • API String ID: 1958988193-4070439852
                              • Opcode ID: bdea57dd96df53d9e829f51e58303117b441e911e19fc522471032f737d6d9df
                              • Instruction ID: fcd55a72cf9b38ed92eee25b8fc798016c5179a181dae4a4499eb8880f316315
                              • Opcode Fuzzy Hash: bdea57dd96df53d9e829f51e58303117b441e911e19fc522471032f737d6d9df
                              • Instruction Fuzzy Hash: 3E113130600740AADA30A7249889A1F37BAD741356F44483EE182676D3C67DDC64C71F

                              Control-flow Graph

                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTimewsprintf
                              • String ID: Offline Keylogger Started
                              • API String ID: 465354869-4114347211
                              • Opcode ID: 8ab6887ada05f8dedd4f656d1a6307b8369bab4b1d95e8e063819601f7111091
                              • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                              • Opcode Fuzzy Hash: 8ab6887ada05f8dedd4f656d1a6307b8369bab4b1d95e8e063819601f7111091
                              • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                              • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,00475300,?,?,0040F88E,004674C8,5.2.0 Pro), ref: 004137E1
                              • RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.2.0 Pro), ref: 004137EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc
                              • API String ID: 1818849710-4028850238
                              • Opcode ID: 04dffd27395d5cb7a301fd27aaace46d1b2beb75a59ed872a5e7c8f8e25a915c
                              • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                              • Opcode Fuzzy Hash: 04dffd27395d5cb7a301fd27aaace46d1b2beb75a59ed872a5e7c8f8e25a915c
                              • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                              • CloseHandle.KERNEL32(00000000), ref: 0041C576
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleReadSize
                              • String ID:
                              • API String ID: 3919263394-0
                              • Opcode ID: ea631e93aeae4d86132659a3c821e70bd950fb822780c369254ddbb306c6d1ec
                              • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                              • Opcode Fuzzy Hash: ea631e93aeae4d86132659a3c821e70bd950fb822780c369254ddbb306c6d1ec
                              • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                              • GetLastError.KERNEL32 ref: 0040D0BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateErrorLastMutex
                              • String ID: 0SG
                              • API String ID: 1925916568-2718230054
                              • Opcode ID: aba24bfd7e8b808837b934fb3074bb655e41bd047bfda9aafcf34366fa62f390
                              • Instruction ID: 897831e38bae895769414ba5eaefcaa992d87aaaa8244aa01aad5f1db7de32a1
                              • Opcode Fuzzy Hash: aba24bfd7e8b808837b934fb3074bb655e41bd047bfda9aafcf34366fa62f390
                              • Instruction Fuzzy Hash: 62D012B0614301EBDB0467709C5975936559B44702F50487AB50BD95F1CBFC88D08519
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                              • RegCloseKey.KERNEL32(?), ref: 0041362D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: e238dbc9e2073977e027648aa5af93dfac856dda57be128719874f60decc0002
                              • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                              • Opcode Fuzzy Hash: e238dbc9e2073977e027648aa5af93dfac856dda57be128719874f60decc0002
                              • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475300), ref: 004135C2
                              • RegCloseKey.KERNEL32(?), ref: 004135CD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                              • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                              • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                              • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                              APIs
                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                              • RegCloseKey.KERNEL32(?,?,?,0040C1D7,00466C58), ref: 00413570
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID:
                              • API String ID: 3677997916-0
                              • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                              • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                              • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                              • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                              APIs
                              • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                              • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                              • RegCloseKey.KERNEL32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID:
                              • API String ID: 1818849710-0
                              • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                              • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                              • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                              • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen
                              • String ID: 8~
                              • API String ID: 176396367-2557204875
                              • Opcode ID: 6416f66ed626dfbba5e3356b56a4da38da9dbdb7e4b27ac51402a9fd72fbddea
                              • Instruction ID: d045c5f40cf3cd8d18dd0e016010c764e1ae3afdbf5b32035de166f485dbb4de
                              • Opcode Fuzzy Hash: 6416f66ed626dfbba5e3356b56a4da38da9dbdb7e4b27ac51402a9fd72fbddea
                              • Instruction Fuzzy Hash: 681193319002059BCB15EF66E842AEE7BB5AF54314B10403FF446672E2EF78AD15CB98
                              APIs
                              • _free.LIBCMT ref: 00446227
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap$_free
                              • String ID:
                              • API String ID: 1482568997-0
                              • Opcode ID: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                              • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                              • Opcode Fuzzy Hash: b157f1fc507fc560bd00b565224a750c722b28025775eaa04a87fd2772ac9c2e
                              • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                              APIs
                              • socket.WS2_32(?,00000001,00000006), ref: 00404852
                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateEventStartupsocket
                              • String ID:
                              • API String ID: 1953588214-0
                              • Opcode ID: 4d13770ae0ce35ce4dbd6fcc6f24a1261d6c2af77246669734211e402fddb5c6
                              • Instruction ID: d30f6c82ceabff406a890a607b6903e59214fa94f63df9469096212d3e1caec2
                              • Opcode Fuzzy Hash: 4d13770ae0ce35ce4dbd6fcc6f24a1261d6c2af77246669734211e402fddb5c6
                              • Instruction Fuzzy Hash: F90171B1408B809ED7359F28A8456967FE0AB55304F044D6EF1DA97B92D3B5A881CB18
                              APIs
                              • getaddrinfo.WS2_32(00000000,00000000,00000000,00472AF0,004750F4,00000000,004151C3,00000000,00000001), ref: 00414F46
                              • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                              • String ID:
                              • API String ID: 1170566393-0
                              • Opcode ID: 930efd5b04e65bc9372c1b57b3a52d6002a1f5a2d46d5e1141b82df15956c107
                              • Instruction ID: b2b0aefd8e35b341f4c894e58f46b645776b5e98a3349e02c71c7f637998c076
                              • Opcode Fuzzy Hash: 930efd5b04e65bc9372c1b57b3a52d6002a1f5a2d46d5e1141b82df15956c107
                              • Instruction Fuzzy Hash: 9DD05B322005316BD310576D6C00FFB569EDFD7760B110037F404D3251DA949C8247AC
                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                              • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                              • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                              • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                              APIs
                              • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: 8e7c991b928bea2de9b1e1f5f99946c2d0cf66c9d18890e3be99548e9599c2f5
                              • Instruction ID: 8755cd578eecc9cf916cb98f31ec890f8d4d8ec8e876fe09ba6f20fbb4fb2f80
                              • Opcode Fuzzy Hash: 8e7c991b928bea2de9b1e1f5f99946c2d0cf66c9d18890e3be99548e9599c2f5
                              • Instruction Fuzzy Hash: 02D0123255C60CCED620ABB4AD0F8A4775CC717616F0403BA6CB5C26D7E6405A2DC2AB
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: send
                              • String ID:
                              • API String ID: 2809346765-0
                              • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                              • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                              • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                              • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004056E6
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              • __Init_thread_footer.LIBCMT ref: 00405723
                              • CreatePipe.KERNEL32(00476CDC,00476CC4,00476BE8,00000000,004660CC,00000000), ref: 004057B6
                              • CreatePipe.KERNEL32(00476CC8,00476CE4,00476BE8,00000000), ref: 004057CC
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BF8,00476CCC), ref: 0040583F
                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474FA0,004660D0,00000062,004660B4), ref: 004059E4
                              • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                              • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                              • CloseHandle.KERNEL32 ref: 00405A23
                              • CloseHandle.KERNEL32 ref: 00405A2B
                              • CloseHandle.KERNEL32 ref: 00405A3D
                              • CloseHandle.KERNEL32 ref: 00405A45
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                              • String ID: @lG$@lG$@lG$@lG$@lG$SystemDrive$cmd.exe$kG$lG$lG$lG$lG
                              • API String ID: 2994406822-3565532687
                              • Opcode ID: e44d338a8cead6cb50835b229e9c9e007a0c5ea8f916dca9c8bfddfb67d1bee9
                              • Instruction ID: efba9956b6c01968ba48be3e84054341744464a70a9fb060b5e58b4ef4e39929
                              • Opcode Fuzzy Hash: e44d338a8cead6cb50835b229e9c9e007a0c5ea8f916dca9c8bfddfb67d1bee9
                              • Instruction Fuzzy Hash: ED91B271600604AFD711FB35AD41A6B3AAAEB84344F01443FF549A72E2DB7D9C488F6D
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 00407CF4
                              • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                              • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C37D
                                • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C3AD
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C402
                                • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C463
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C46A
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474F08,?), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474F08,?,?,?,?,?,?,0040547D), ref: 00404B75
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                              • DeleteFileA.KERNEL32(?), ref: 0040868D
                                • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                              • Sleep.KERNEL32(000007D0), ref: 00408733
                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                              • String ID: (aF$8PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$hPG$hPG$hPG$hPG$open
                              • API String ID: 1067849700-1785547828
                              • Opcode ID: aaf0a533dca12abd14834f9832747f042639ce70c3777fe8f7b287af3282d1ab
                              • Instruction ID: d596b55e62c6dc406d7f5c06aadeacefb76b4acf2f669351df47ebe9cc805958
                              • Opcode Fuzzy Hash: aaf0a533dca12abd14834f9832747f042639ce70c3777fe8f7b287af3282d1ab
                              • Instruction Fuzzy Hash: 9F4282716043016BC604FB76C9579AE77A9AF91348F80483FF582671E2EE7C9908C79B
                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 00412141
                                • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                              • CloseHandle.KERNEL32(00000000), ref: 00412190
                              • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                              • String ID: (TG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$RG
                              • API String ID: 3018269243-1913798818
                              • Opcode ID: 487cb0c94f3c81f9ea2266224390f7fb4e07e51fb2116567e8d70626cc6924ac
                              • Instruction ID: 26abbb7e12f392f9fbc718c06b30ae47eaa1113e002934215aad22704783e961
                              • Opcode Fuzzy Hash: 487cb0c94f3c81f9ea2266224390f7fb4e07e51fb2116567e8d70626cc6924ac
                              • Instruction Fuzzy Hash: 3C71A23160420167C604FB72CD579AE77A4AE94308F40097FF586A61E2FFBC9945C69E
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                              • FindClose.KERNEL32(00000000), ref: 0040BC04
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                              • FindClose.KERNEL32(00000000), ref: 0040BD4D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                              • API String ID: 1164774033-3681987949
                              • Opcode ID: 240c7abc9a27c5f0695d89c57ca45c6d86bcae19cd69a5bd1518bd38cb464be9
                              • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                              • Opcode Fuzzy Hash: 240c7abc9a27c5f0695d89c57ca45c6d86bcae19cd69a5bd1518bd38cb464be9
                              • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                              APIs
                              • OpenClipboard.USER32 ref: 004168FD
                              • EmptyClipboard.USER32 ref: 0041690B
                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                              • GlobalLock.KERNEL32(00000000), ref: 00416934
                              • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                              • CloseClipboard.USER32 ref: 00416990
                              • OpenClipboard.USER32 ref: 00416997
                              • GetClipboardData.USER32(0000000D), ref: 004169A7
                              • GlobalLock.KERNEL32(00000000), ref: 004169B0
                              • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                              • CloseClipboard.USER32 ref: 004169BF
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                              • String ID: !D@$xdF
                              • API String ID: 3520204547-3540039394
                              • Opcode ID: ea03346bbf16815fa456705de0f18d04f37567a83fb2a5f94a5820b547a33c8a
                              • Instruction ID: 40a69bedac3bd734cdfdd6227e623399476ab8ebe6f0a7c245c4ec6d1d06efb6
                              • Opcode Fuzzy Hash: ea03346bbf16815fa456705de0f18d04f37567a83fb2a5f94a5820b547a33c8a
                              • Instruction Fuzzy Hash: 16215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750F4,?,00475348), ref: 0040F4C9
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475348), ref: 0040F4F4
                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475348), ref: 0040F59E
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • CloseHandle.KERNEL32(00000000,?,00475348), ref: 0040F6A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$xdF$xdF$RG
                              • API String ID: 3756808967-1574553308
                              • Opcode ID: 1d3b465f8a309ae3198bcab5bb83e2fcd34d8ef8e9b0c4606d8e85a41c47158d
                              • Instruction ID: f7ffc7f0dfbd756cb6275d6ec2ba0be94116b78c8c9f611e281f0170cc986b4a
                              • Opcode Fuzzy Hash: 1d3b465f8a309ae3198bcab5bb83e2fcd34d8ef8e9b0c4606d8e85a41c47158d
                              • Instruction Fuzzy Hash: 4C7130705083419AC724FB21D8559AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                              • FindClose.KERNEL32(00000000), ref: 0040BE04
                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                              • FindClose.KERNEL32(00000000), ref: 0040BEEA
                              • FindClose.KERNEL32(00000000), ref: 0040BF0B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$File$FirstNext
                              • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 3527384056-432212279
                              • Opcode ID: 61ad11e382702adddc4a1e89b9b08581dc943ae9ab3a3ebcc98b18262fb5c5cd
                              • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                              • Opcode Fuzzy Hash: 61ad11e382702adddc4a1e89b9b08581dc943ae9ab3a3ebcc98b18262fb5c5cd
                              • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                              APIs
                              • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                              • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                              • CloseHandle.KERNEL32(00000000), ref: 0041349A
                              • CloseHandle.KERNEL32(?), ref: 004134A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                              • String ID:
                              • API String ID: 297527592-0
                              • Opcode ID: d99a684a37cd504ab80958f635133239dca2fb251659f1539cd44eb0602d1c2c
                              • Instruction ID: cfdeae1586e3f17d3ae994cf28232467201964e06db1490d1c70a6fe2d897c90
                              • Opcode Fuzzy Hash: d99a684a37cd504ab80958f635133239dca2fb251659f1539cd44eb0602d1c2c
                              • Instruction Fuzzy Hash: A841F371104301BBD7109F26EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0$1$2$3$4$5$6$7
                              • API String ID: 0-3177665633
                              • Opcode ID: bbb04b4e4ef4cf43d21947f6752686c6d5343f3de50f2534b72754370d573c82
                              • Instruction ID: 3c74f5afe55031bef20d6cb4aa2bc38f0c43463ce83be6e36937eb537edf8bdf
                              • Opcode Fuzzy Hash: bbb04b4e4ef4cf43d21947f6752686c6d5343f3de50f2534b72754370d573c82
                              • Instruction Fuzzy Hash: CB71E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                              APIs
                              • GetForegroundWindow.USER32(?,?,00475100), ref: 0040A451
                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                              • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                              • GetKeyState.USER32(00000010), ref: 0040A46E
                              • GetKeyboardState.USER32(?,?,00475100), ref: 0040A479
                              • ToUnicodeEx.USER32(00475154,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                              • ToUnicodeEx.USER32(00475154,?,?,?,00000010,00000000,00000000), ref: 0040A535
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                              • String ID: (kG
                              • API String ID: 1888522110-2813241365
                              • Opcode ID: 79348ff8eaa35f6faedaca36de41c7c480938a272048c625dc6fe4e82d71162d
                              • Instruction ID: 3b9a32d10988b9101c987d3e8fcb44953e801c6634267c48ca941b3c69dca571
                              • Opcode Fuzzy Hash: 79348ff8eaa35f6faedaca36de41c7c480938a272048c625dc6fe4e82d71162d
                              • Instruction Fuzzy Hash: F8316D72504308BFD700DFA0DC45F9B7BECAB88754F00083AB645D61A0D7B5E948CBA6
                              APIs
                                • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                              • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                              • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                              • String ID: !D@$$aF$(aF$,aF$PowrProf.dll$SetSuspendState
                              • API String ID: 1589313981-3345310279
                              • Opcode ID: 56669b365c17b71bed43a51b30709bc266bcd301c9d2fa04bd2d84ce38f41b74
                              • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                              • Opcode Fuzzy Hash: 56669b365c17b71bed43a51b30709bc266bcd301c9d2fa04bd2d84ce38f41b74
                              • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                              APIs
                              • _wcslen.LIBCMT ref: 0040755C
                              • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Object_wcslen
                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                              • API String ID: 240030777-3166923314
                              • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                              • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                              • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                              • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                              APIs
                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758F8), ref: 0041A7EF
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                              • GetLastError.KERNEL32 ref: 0041A84C
                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                              • String ID:
                              • API String ID: 3587775597-0
                              • Opcode ID: 6829f97737706ffae818d601d13e90887b13f82653637559be9d75c8c2a528fc
                              • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                              • Opcode Fuzzy Hash: 6829f97737706ffae818d601d13e90887b13f82653637559be9d75c8c2a528fc
                              • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                              • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                              • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                              • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                              • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                              • String ID: JD$JD$JD
                              • API String ID: 745075371-3517165026
                              • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                              • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                              • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                              • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                              • FindClose.KERNEL32(00000000), ref: 0040C4B8
                              • FindClose.KERNEL32(00000000), ref: 0040C4E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFile$FirstNext
                              • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                              • API String ID: 1164774033-405221262
                              • Opcode ID: 9a74441e6a62c791e3d48e394381276e6adc98fd532e91d105d045f394039e41
                              • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                              • Opcode Fuzzy Hash: 9a74441e6a62c791e3d48e394381276e6adc98fd532e91d105d045f394039e41
                              • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C37D
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C3AD
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C41F
                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C42C
                                • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C402
                              • GetLastError.KERNEL32(?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C44D
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C463
                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C46A
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,004752E8,00475300,00000001), ref: 0041C473
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                              • String ID:
                              • API String ID: 2341273852-0
                              • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                              • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                              • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                              • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                              APIs
                              • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                              • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                              • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressCloseCreateLibraryLoadProcsend
                              • String ID: SHDeleteKeyW$Shlwapi.dll
                              • API String ID: 2127411465-314212984
                              • Opcode ID: 834e0a0357c9bd35fc75afbee9585628136f3e7a26421bc33e01608f2dfc2d19
                              • Instruction ID: cc57822c2a7f940fffebe33daf0632284ddc1748a3b8d5e961f42c670a34d5b4
                              • Opcode Fuzzy Hash: 834e0a0357c9bd35fc75afbee9585628136f3e7a26421bc33e01608f2dfc2d19
                              • Instruction Fuzzy Hash: D1B1F671A0430066CA14BB76DC579AF36A89F91748F40053FB906671E2EE7D8A48C6DA
                              APIs
                              • _free.LIBCMT ref: 00449292
                              • _free.LIBCMT ref: 004492B6
                              • _free.LIBCMT ref: 0044943D
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                              • _free.LIBCMT ref: 00449609
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                              • String ID:
                              • API String ID: 314583886-0
                              • Opcode ID: 85d2a707ffa6ab69f680b8646be9a2f79c2d84175361cf4d1e6837d974162392
                              • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                              • Opcode Fuzzy Hash: 85d2a707ffa6ab69f680b8646be9a2f79c2d84175361cf4d1e6837d974162392
                              • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Find$CreateFirstNext
                              • String ID: 8eF$HSG$`XG$`XG
                              • API String ID: 341183262-1600017543
                              • Opcode ID: 9dca81da2435427dbd892e845fe380a0bef1810f3c75f4ecfaf4c4c42d66e163
                              • Instruction ID: 3e2b8d556a8fbdbb081ab446324185a4f3aab8361380fbf0113865ad31d0729a
                              • Opcode Fuzzy Hash: 9dca81da2435427dbd892e845fe380a0bef1810f3c75f4ecfaf4c4c42d66e163
                              • Instruction Fuzzy Hash: 588151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                              Strings
                              • C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, xrefs: 00407042, 0040716A
                              • 0aF, xrefs: 0040701B
                              • 0aF, xrefs: 0040712C
                              • open, xrefs: 00406FF1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadExecuteFileShell
                              • String ID: 0aF$0aF$C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$open
                              • API String ID: 2825088817-4166883136
                              • Opcode ID: 80dce47aa2b353d199e6b7a52a1bd9928f0a19c4729af53ae302103d965fce1d
                              • Instruction ID: e12f74d6213dd3660153607da8c9b98f7978e2d251169c1aa1e307be856b925d
                              • Opcode Fuzzy Hash: 80dce47aa2b353d199e6b7a52a1bd9928f0a19c4729af53ae302103d965fce1d
                              • Instruction Fuzzy Hash: 1461C471A0830166CA14FB76C8569BE37A59F81758F40093FF9427B2D2EE3C9905C79B
                              APIs
                              • __EH_prolog.LIBCMT ref: 0040884C
                              • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                              • String ID: xdF
                              • API String ID: 1771804793-999140092
                              • Opcode ID: 38802d10882615ef338cffc9586822bbeeed39d2cd44aa7df9ba9a74de3d35aa
                              • Instruction ID: 967e03bdddb214c30410211942a515ee3c29859e80101891d5c5db132fd2cd64
                              • Opcode Fuzzy Hash: 38802d10882615ef338cffc9586822bbeeed39d2cd44aa7df9ba9a74de3d35aa
                              • Instruction Fuzzy Hash: 94517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB99
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                              • GetLastError.KERNEL32 ref: 0040BA93
                              Strings
                              • UserProfile, xrefs: 0040BA59
                              • [Chrome StoredLogins not found], xrefs: 0040BAAD
                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                              • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                              • API String ID: 2018770650-1062637481
                              • Opcode ID: dc2b2689bc299d8874a4aac579e14b6bb7d4073350ebb0a6e73faa8ce1665e3c
                              • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                              • Opcode Fuzzy Hash: dc2b2689bc299d8874a4aac579e14b6bb7d4073350ebb0a6e73faa8ce1665e3c
                              • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                              APIs
                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                              • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                              • GetLastError.KERNEL32 ref: 004179D8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                              • String ID: SeShutdownPrivilege
                              • API String ID: 3534403312-3733053543
                              • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                              • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                              • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                              • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                              • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                              • Opcode Fuzzy Hash: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                              • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                              APIs
                              • __EH_prolog.LIBCMT ref: 00409293
                                • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,?,?), ref: 004048E0
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                              • FindClose.KERNEL32(00000000), ref: 004093FC
                                • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                • Part of subcall function 00404E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                              • FindClose.KERNEL32(00000000), ref: 004095F4
                                • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474F08,?), ref: 00404B47
                                • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474F08,?,?,?,?,?,?,0040547D), ref: 00404B75
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                              • String ID:
                              • API String ID: 1824512719-0
                              • Opcode ID: 5c6518d5ccd4542ca446c00fe3e2ba88ba2af3e10b8b70c3740a52affa6f51d0
                              • Instruction ID: 7a56ba3823c44b8d3dadbfeca74e3365e00ee059376cf1b582d15bdd70b30780
                              • Opcode Fuzzy Hash: 5c6518d5ccd4542ca446c00fe3e2ba88ba2af3e10b8b70c3740a52affa6f51d0
                              • Instruction Fuzzy Hash: 8AB19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                              • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ManagerStart
                              • String ID:
                              • API String ID: 276877138-0
                              • Opcode ID: 628d36ac3c64f627b3a8437270a5a78b3dcfd045bfbfd251d1d1fe9a009dd844
                              • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                              • Opcode Fuzzy Hash: 628d36ac3c64f627b3a8437270a5a78b3dcfd045bfbfd251d1d1fe9a009dd844
                              • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                              APIs
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                              • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: ACP$OCP
                              • API String ID: 2299586839-711371036
                              • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                              • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                              • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                              • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileFind$FirstNextsend
                              • String ID: 8eF$hPG$hPG
                              • API String ID: 4113138495-2076665626
                              • Opcode ID: 2a55d85aba819a4f1e85d91723afb191ec273a2b57c0c4602aff2705a6b2aa3d
                              • Instruction ID: abfa5a3658aec55442980c0effbd4670719d50d4d7308f226e3cac976b3f196c
                              • Opcode Fuzzy Hash: 2a55d85aba819a4f1e85d91723afb191ec273a2b57c0c4602aff2705a6b2aa3d
                              • Instruction Fuzzy Hash: CB2195315082019BC314FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA09C65B
                              APIs
                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000,00475300,?,?,0040F88E,004674C8,5.2.0 Pro), ref: 004137E1
                                • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?,?,?,0040F88E,004674C8,5.2.0 Pro), ref: 004137EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateInfoParametersSystemValue
                              • String ID: ,aF$Control Panel\Desktop$TileWallpaper$WallpaperStyle
                              • API String ID: 4127273184-3126330168
                              • Opcode ID: 2255f836dd28e7611188bde577821a4037072de5ff95c6773c36a6d8101e126d
                              • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                              • Opcode Fuzzy Hash: 2255f836dd28e7611188bde577821a4037072de5ff95c6773c36a6d8101e126d
                              • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                              APIs
                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                              • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                              • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                              • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Resource$FindLoadLockSizeof
                              • String ID: SETTINGS
                              • API String ID: 3473537107-594951305
                              • Opcode ID: 7e39093ddf5dcb720cd3caccf1e1277dc2c4d9143844da5a4d70bf483eb1c798
                              • Instruction ID: e87eb13c1a863bb520e8110b03cd0e44f0123e9e346c2db4eb51eb31bea7c0b5
                              • Opcode Fuzzy Hash: 7e39093ddf5dcb720cd3caccf1e1277dc2c4d9143844da5a4d70bf483eb1c798
                              • Instruction Fuzzy Hash: 23E01276600B21EBDB211FB1AC8CD467F25E7C9B533140075FA0582271CB758840DA58
                              APIs
                              • __EH_prolog.LIBCMT ref: 004096A5
                              • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstH_prologNext
                              • String ID:
                              • API String ID: 1157919129-0
                              • Opcode ID: b4b1b7fdb5c349b8172f0a32a244ece9ede79f1f889a4f20590f984b1f7d5975
                              • Instruction ID: 095255599cc0af9be2c5710cd9f248f54336688560ad7ccdcde9a73cf5c292f5
                              • Opcode Fuzzy Hash: b4b1b7fdb5c349b8172f0a32a244ece9ede79f1f889a4f20590f984b1f7d5975
                              • Instruction Fuzzy Hash: CB813C729001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                              • _wcschr.LIBVCRUNTIME ref: 00451ECA
                              • _wcschr.LIBVCRUNTIME ref: 00451ED8
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                              • String ID:
                              • API String ID: 4212172061-0
                              • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                              • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                              • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                              • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: p'E$JD
                              • API String ID: 1084509184-908320845
                              • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                              • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                              • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                              • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorInfoLastLocale$_free$_abort
                              • String ID:
                              • API String ID: 2829624132-0
                              • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                              • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                              • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                              • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                              • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                              • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                              • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                              APIs
                              • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                              • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                              • ExitProcess.KERNEL32 ref: 0044338F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                              • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                              • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                              • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                              APIs
                              • OpenClipboard.USER32(00000000), ref: 0040B74C
                              • GetClipboardData.USER32(0000000D), ref: 0040B758
                              • CloseClipboard.USER32 ref: 0040B760
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseDataOpen
                              • String ID:
                              • API String ID: 2058664381-0
                              • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                              • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                              • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                              • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                              • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                              • CloseHandle.KERNEL32(00000000,?,?,0041605F,00000000), ref: 0041BBE7
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenResume
                              • String ID:
                              • API String ID: 3614150671-0
                              • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                              • Instruction ID: dbaabbb0ea2570487ff62d8cf89bd30b477e7113d13ca21b8680662729a76e86
                              • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                              • Instruction Fuzzy Hash: 66D05E36204121E3C320176A7C0CD97AD68DBC5AA2705412AF804C26649A60CC0186E4
                              APIs
                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                              • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                              • CloseHandle.KERNEL32(00000000,?,?,0041603A,00000000), ref: 0041BBBB
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpenSuspend
                              • String ID:
                              • API String ID: 1999457699-0
                              • Opcode ID: 15699d522662e94a36dc9f627e6c03bf4f255e4023340f214c75571920ff47a0
                              • Instruction ID: 1e4755145751be78863ec26184204985b99a3e1fec7ed1e2fa2d7a7f5aac3163
                              • Opcode Fuzzy Hash: 15699d522662e94a36dc9f627e6c03bf4f255e4023340f214c75571920ff47a0
                              • Instruction Fuzzy Hash: 73D05E36104121E3C6211B6A7C0CD97AD68DFC5AA2705412AF904D26509A20CC0186E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .
                              • API String ID: 0-248832578
                              • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                              • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                              • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                              • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID: JD
                              • API String ID: 1084509184-2669065882
                              • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                              • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                              • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                              • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                              APIs
                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2299586839-2904428671
                              • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                              • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                              • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                              • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                              • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                              • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                              • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$FreeProcess
                              • String ID:
                              • API String ID: 3859560861-0
                              • Opcode ID: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                              • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                              • Opcode Fuzzy Hash: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                              • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004533A6,?,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                              • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                              • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                              • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                              • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                              • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                              • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                              APIs
                              • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: FeaturePresentProcessor
                              • String ID:
                              • API String ID: 2325560087-0
                              • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                              • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                              • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                              • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$InfoLocale_abort
                              • String ID:
                              • API String ID: 1663032902-0
                              • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                              • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                              • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                              • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$InfoLocale_abort_free
                              • String ID:
                              • API String ID: 2692324296-0
                              • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                              • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                              • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                              • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                              APIs
                                • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                              • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalEnterEnumLocalesSectionSystem
                              • String ID:
                              • API String ID: 1272433827-0
                              • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                              • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                              • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                              • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                              • String ID:
                              • API String ID: 1084509184-0
                              • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                              • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                              • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                              • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                              APIs
                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EF0,00475A10,00474EF0,00000000,00474EF0,00000000,00474EF0,5.2.0 Pro), ref: 0040F920
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 4f66370edde0bdaa3bcc008f8ea5ce22c00289683c96eec7ff0f1ed7c7935faa
                              • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                              • Opcode Fuzzy Hash: 4f66370edde0bdaa3bcc008f8ea5ce22c00289683c96eec7ff0f1ed7c7935faa
                              • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                              • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                              • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                              • Instruction Fuzzy Hash:
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: RGw@
                              • API String ID: 0-316194375
                              • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                              • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                              • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                              • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: @
                              • API String ID: 0-2766056989
                              • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                              • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                              • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                              • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                              • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                              • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                              • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                              • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                              • Opcode Fuzzy Hash: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                              • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                              • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                              • Opcode Fuzzy Hash: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                              • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                              • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                              • Opcode Fuzzy Hash: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                              • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                              • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                              • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                              • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                              • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                              • Opcode Fuzzy Hash: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                              • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                              • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                              • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                              • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                              • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                              • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                              • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                              • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                              • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                              • Opcode Fuzzy Hash: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                              • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                              • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                              • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508
                              APIs
                              • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                              • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                              • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                              • DeleteDC.GDI32(00000000), ref: 00418F65
                              • DeleteDC.GDI32(00000000), ref: 00418F68
                              • DeleteObject.GDI32(00000000), ref: 00418F6B
                              • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                              • DeleteDC.GDI32(00000000), ref: 00418F9D
                              • DeleteDC.GDI32(00000000), ref: 00418FA0
                              • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                              • GetCursorInfo.USER32(?), ref: 00418FE2
                              • GetIconInfo.USER32(?,?), ref: 00418FF8
                              • DeleteObject.GDI32(?), ref: 00419027
                              • DeleteObject.GDI32(?), ref: 00419034
                              • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                              • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00660046), ref: 00419077
                              • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                              • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                              • DeleteDC.GDI32(?), ref: 004191B7
                              • DeleteDC.GDI32(00000000), ref: 004191BA
                              • DeleteObject.GDI32(00000000), ref: 004191BD
                              • GlobalFree.KERNEL32(?), ref: 004191C8
                              • DeleteObject.GDI32(00000000), ref: 0041927C
                              • GlobalFree.KERNEL32(?), ref: 00419283
                              • DeleteDC.GDI32(?), ref: 00419293
                              • DeleteDC.GDI32(00000000), ref: 0041929E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                              • String ID: DISPLAY
                              • API String ID: 4256916514-865373369
                              • Opcode ID: c1f87ec315365c2bd807a29870f8556d4033a7f08f871e569c42423f77b65dc4
                              • Instruction ID: 987d9a4534759b20ade43e5cc0d007ec6aae9fd5378911baa39845865ae00971
                              • Opcode Fuzzy Hash: c1f87ec315365c2bd807a29870f8556d4033a7f08f871e569c42423f77b65dc4
                              • Instruction Fuzzy Hash: D8C15C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                              APIs
                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                              • GetProcAddress.KERNEL32(00000000), ref: 00418174
                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                              • GetProcAddress.KERNEL32(00000000), ref: 00418188
                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                              • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                              • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                              • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                              • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                              • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                              • ResumeThread.KERNEL32(?), ref: 00418470
                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                              • GetCurrentProcess.KERNEL32(?), ref: 00418492
                              • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                              • GetLastError.KERNEL32 ref: 004184B5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`Wu$ntdll
                              • API String ID: 4188446516-529412701
                              • Opcode ID: 8f07b7a254e48d041da81a251375b09bf463a0f5c88c0795319c3241d295ec1a
                              • Instruction ID: 6e605283caf6159cf0966bfa06415cd8be065dbd330dc5e1b11c181c8b11ae87
                              • Opcode Fuzzy Hash: 8f07b7a254e48d041da81a251375b09bf463a0f5c88c0795319c3241d295ec1a
                              • Instruction Fuzzy Hash: 5AA14DB0604301AFDB209F64DD85B6B7BE8FB88745F04482EF689D6291EB78DC44CB59
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00475300,pth_unenc,0040D0F3,004752E8,00475300,?,pth_unenc), ref: 0040B8F6
                                • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(00475100), ref: 0040B902
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                              • ExitProcess.KERNEL32 ref: 0040D80B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: """, 0$")$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$HSG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$tMG$wend$while fso.FileExists("$xdF$xpF
                              • API String ID: 1861856835-1567776996
                              • Opcode ID: 198573895b831af224f1748186f026a207cf66993cbc8dce85765c012f1a2dd4
                              • Instruction ID: 74aa42f7ec26bf67edaf4e1a165d404297a62af2c65c2789fcbb2c22ca84ca6d
                              • Opcode Fuzzy Hash: 198573895b831af224f1748186f026a207cf66993cbc8dce85765c012f1a2dd4
                              • Instruction Fuzzy Hash: B991B1316082005AC315FB62D8529AFB3A8AF94309F50443FB64AA71E3EF7C9D49C65E
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00475300,?,pth_unenc), ref: 0040D1E0
                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00475300,?,pth_unenc), ref: 0040D223
                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00475300,?,pth_unenc), ref: 0040D232
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,00475300,pth_unenc,0040D0F3,004752E8,00475300,?,pth_unenc), ref: 0040B8F6
                                • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(00475100), ref: 0040B902
                                • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75573530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,00475300), ref: 0041BA30
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                              • ExitProcess.KERNEL32 ref: 0040D454
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                              • String ID: ")$.vbs$HSG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$tMG$wend$while fso.FileExists("$xdF$xpF
                              • API String ID: 3797177996-4161133245
                              • Opcode ID: c9fca1427ace004c381d2fcae3b1018c122983d46801f9d9a583e9de15546c08
                              • Instruction ID: d04a29aa4e51556796b06844e147f4a7cb6a24a543372ca0e3e4f3e54a9e1c14
                              • Opcode Fuzzy Hash: c9fca1427ace004c381d2fcae3b1018c122983d46801f9d9a583e9de15546c08
                              • Instruction Fuzzy Hash: 7781A1716082405BC715FB62D8529AF73A8AF94308F10443FB58A671E3EF7C9E49C69E
                              APIs
                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750F4,00000003), ref: 004124CF
                              • ExitProcess.KERNEL32(00000000), ref: 004124DB
                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                              • CloseHandle.KERNEL32(00000000), ref: 00412576
                              • GetCurrentProcessId.KERNEL32 ref: 0041257C
                              • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                              • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                              • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                              • Sleep.KERNEL32(000001F4), ref: 004126BD
                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                              • CloseHandle.KERNEL32(00000000), ref: 004126E4
                              • GetCurrentProcessId.KERNEL32 ref: 004126EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                              • String ID: (TG$.exe$HSG$WDH$exepath$open$temp_
                              • API String ID: 2649220323-4116078715
                              • Opcode ID: 53b45b28b9fed311eed54082bc18d6df22a879a0c143a2a3171f7a0026fd4a41
                              • Instruction ID: 24c9a3d3f9f851b6826daa3a71410153ee30a0e468f06c14c2e22e8a151f545e
                              • Opcode Fuzzy Hash: 53b45b28b9fed311eed54082bc18d6df22a879a0c143a2a3171f7a0026fd4a41
                              • Instruction Fuzzy Hash: B551C771A00315BBDB10ABA09C99EFE336D9B04755F10416BF901E72D2EFBC8E85865D
                              APIs
                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EF0,00000000), ref: 0041B21F
                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                              • SetEvent.KERNEL32 ref: 0041B2AA
                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                              • CloseHandle.KERNEL32 ref: 0041B2CB
                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                              • API String ID: 738084811-1354618412
                              • Opcode ID: 8d58fbfb6190c3f3b09755e9cec4986d803daceaa2324f9e2d03a17bc5feb97a
                              • Instruction ID: 3073296416e4f75d74a960dba2816641598052066ba22d453d93bca4cbe87184
                              • Opcode Fuzzy Hash: 8d58fbfb6190c3f3b09755e9cec4986d803daceaa2324f9e2d03a17bc5feb97a
                              • Instruction Fuzzy Hash: 4E51A5B12442056ED714B731DC96EBF379CDB80359F10053FB24A621E2EF789D4986AE
                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401D55
                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401D7F
                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401D8F
                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401D9F
                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401DAF
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401DBF
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401DD0
                              • WriteFile.KERNEL32(00000000,00472ACA,00000002,00000000,00000000), ref: 00401DE1
                              • WriteFile.KERNEL32(00000000,00472ACC,00000004,00000000,00000000), ref: 00401DF1
                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401E01
                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401E12
                              • WriteFile.KERNEL32(00000000,00472AD6,00000002,00000000,00000000), ref: 00401E23
                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401E33
                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401E43
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Write$Create
                              • String ID: RIFF$WAVE$data$fmt
                              • API String ID: 1602526932-4212202414
                              • Opcode ID: 827ce642555df21a050573d9d5a330f37f16d9829fec6a71b542a6fa22e9225d
                              • Instruction ID: 52f5d26e7cd893c7c7a939122a780f0294375d64c437cdec10b118f5e091287a
                              • Opcode Fuzzy Hash: 827ce642555df21a050573d9d5a330f37f16d9829fec6a71b542a6fa22e9225d
                              • Instruction Fuzzy Hash: 61414D72644208BAE210DB51DD85FBB7FECEB89F54F40041AFA44D6081E7A5E909DBB3
                              APIs
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe,00000001,00407688,C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe,00000003,004076B0,004752E8,00407709), ref: 004072BF
                              • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                              • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                              • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                              • GetProcAddress.KERNEL32(00000000), ref: 00407308
                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                              • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                              • GetProcAddress.KERNEL32(00000000), ref: 00407330
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                              • API String ID: 1646373207-1790860018
                              • Opcode ID: acc633f1adce617efce258e7e3813168510e5abee68bf21287a11e169d765cdb
                              • Instruction ID: 830827c477b4c5a159b6e54fb752daf43fd3ce12eed95b51e760902f95858ec4
                              • Opcode Fuzzy Hash: acc633f1adce617efce258e7e3813168510e5abee68bf21287a11e169d765cdb
                              • Instruction Fuzzy Hash: 66015EA0E4431676DB116F7AAD44D5B7EDD9E41351311087BB405E2292EEBCE800C9AE
                              APIs
                              • _wcslen.LIBCMT ref: 0040CE42
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750F4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe,00000000,00000000,00000000,00000000,00000000,?,004750F4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                              • _wcslen.LIBCMT ref: 0040CF21
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe,00000000,00000000), ref: 0040CFBF
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                              • _wcslen.LIBCMT ref: 0040D001
                              • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750F4,0000000E), ref: 0040D068
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                              • ExitProcess.KERNEL32 ref: 0040D09D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                              • String ID: 6$C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$del$open$xdF$RG$RG
                              • API String ID: 1579085052-1666335319
                              • Opcode ID: 0fa9b5b1dd786efaf3be6b7155859af5081faa42a1eb35d72d6144a2fd8a8eb1
                              • Instruction ID: ff97e746579a928a3d51456624c9bd3823d06e613cf3e42bd6c526c8f9e3827f
                              • Opcode Fuzzy Hash: 0fa9b5b1dd786efaf3be6b7155859af5081faa42a1eb35d72d6144a2fd8a8eb1
                              • Instruction Fuzzy Hash: 8051C620208302ABD615B7769C92A6F67999F84719F10443FF609BA1E3EF7C9C05866E
                              APIs
                              • lstrlenW.KERNEL32(?), ref: 0041C0C7
                              • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                              • lstrlenW.KERNEL32(?), ref: 0041C0F8
                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                              • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                              • _wcslen.LIBCMT ref: 0041C1CC
                              • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                              • GetLastError.KERNEL32 ref: 0041C204
                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                              • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                              • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                              • GetLastError.KERNEL32 ref: 0041C261
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                              • String ID: ?
                              • API String ID: 3941738427-1684325040
                              • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                              • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                              • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                              • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$EnvironmentVariable$_wcschr
                              • String ID:
                              • API String ID: 3899193279-0
                              • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                              • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                              • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                              • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75573530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,00475300), ref: 0041BA30
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                              • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                              • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                              • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                              • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                              • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                              • Sleep.KERNEL32(00000064), ref: 00412ECF
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                              • String ID: /stext "$,aF$@TG$@TG
                              • API String ID: 1223786279-971885606
                              • Opcode ID: 1089e8409c8748c2f1d33ab5577a065e3cdefa75d79e0cc4dd9823ce6f5b3101
                              • Instruction ID: 54c64e465a66050ec466d83b34d0c9889d7f3cdaa7358c1e9e14d2467042f0e2
                              • Opcode Fuzzy Hash: 1089e8409c8748c2f1d33ab5577a065e3cdefa75d79e0cc4dd9823ce6f5b3101
                              • Instruction Fuzzy Hash: 5B0268315083414AC325FB62D891AEFB3E5AFD0348F50483FF58A971E2EF785A49C65A
                              APIs
                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                              • GetCursorPos.USER32(?), ref: 0041D67A
                              • SetForegroundWindow.USER32(?), ref: 0041D683
                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                              • Shell_NotifyIconA.SHELL32(00000002,00474B58), ref: 0041D6EE
                              • ExitProcess.KERNEL32 ref: 0041D6F6
                              • CreatePopupMenu.USER32 ref: 0041D6FC
                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                              • String ID: Close
                              • API String ID: 1657328048-3535843008
                              • Opcode ID: 73816c5193d16127c0aec765399ca9dfe531eb1d692a29e38a1feb3416d684dd
                              • Instruction ID: b66198a42bffced696eb94d9f3abdc54ecf3157c52e3fd06dc0985426ba48be4
                              • Opcode Fuzzy Hash: 73816c5193d16127c0aec765399ca9dfe531eb1d692a29e38a1feb3416d684dd
                              • Instruction Fuzzy Hash: 51216BB1500208FFDF054FA4ED0EAAA7B35EB08302F000125FA19950B2D779EDA1EB18
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$Info
                              • String ID:
                              • API String ID: 2509303402-0
                              • Opcode ID: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                              • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                              • Opcode Fuzzy Hash: 6f6fc0ac27b4b2f00b1102b51bee0220b0be09f2ed36c41455f2b0a14b53fe9c
                              • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                              APIs
                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                              • __aulldiv.LIBCMT ref: 00408D88
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                              • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                              • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                              • CloseHandle.KERNEL32(00000000), ref: 00409037
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $xdF
                              • API String ID: 3086580692-731956494
                              • Opcode ID: e5d2aae44af06f96918721fc04aa768e3445621523b26a71f08752471c42a894
                              • Instruction ID: 2d1ece25e1b497defd969945f9de4b01d63c4d7912a1bb42583949d7b10afa87
                              • Opcode Fuzzy Hash: e5d2aae44af06f96918721fc04aa768e3445621523b26a71f08752471c42a894
                              • Instruction Fuzzy Hash: 76B1A0316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB9B
                              APIs
                                • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00475300), ref: 0041374F
                                • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                • Part of subcall function 00413733: RegCloseKey.ADVAPI32(00000000), ref: 00413773
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                              • ExitProcess.KERNEL32 ref: 0040D9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                              • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$HSG$Temp$exepath$open$xdF
                              • API String ID: 1913171305-3121233398
                              • Opcode ID: fb2329f7c0d76c45139708512a8f45dc469ed358b293a4c9b91b59bc056627a2
                              • Instruction ID: 050033375253242a90a907d975c9615f3488646990559cd5331657e2136e0730
                              • Opcode Fuzzy Hash: fb2329f7c0d76c45139708512a8f45dc469ed358b293a4c9b91b59bc056627a2
                              • Instruction Fuzzy Hash: 514139319001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E4ACA98
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                              • LoadLibraryA.KERNEL32(?), ref: 00414E52
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                              • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                              • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                              • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                              • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                              • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Library$AddressFreeProc$Load$DirectorySystem
                              • String ID: \ws2_32$\wship6$getaddrinfo
                              • API String ID: 2490988753-3078833738
                              • Opcode ID: 93ac1047b93552b97dd98974212ca4d4f14522e3aac142c7c555de1a9c5e5d12
                              • Instruction ID: 3afff981d8ce70f6205f85204df1f21ec1f12b20cff6a054e3a0857f0929e507
                              • Opcode Fuzzy Hash: 93ac1047b93552b97dd98974212ca4d4f14522e3aac142c7c555de1a9c5e5d12
                              • Instruction Fuzzy Hash: 3231C2B2906315ABD7209F65CC84EDF76DCAB84754F004A2AF984A3211D738D985CBAE
                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 0045138A
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                              • _free.LIBCMT ref: 0045137F
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 004513A1
                              • _free.LIBCMT ref: 004513B6
                              • _free.LIBCMT ref: 004513C1
                              • _free.LIBCMT ref: 004513E3
                              • _free.LIBCMT ref: 004513F6
                              • _free.LIBCMT ref: 00451404
                              • _free.LIBCMT ref: 0045140F
                              • _free.LIBCMT ref: 00451447
                              • _free.LIBCMT ref: 0045144E
                              • _free.LIBCMT ref: 0045146B
                              • _free.LIBCMT ref: 00451483
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                              • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                              • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                              • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                              • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                              • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                              APIs
                                • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                              • GetLastError.KERNEL32 ref: 00455D6F
                              • __dosmaperr.LIBCMT ref: 00455D76
                              • GetFileType.KERNEL32(00000000), ref: 00455D82
                              • GetLastError.KERNEL32 ref: 00455D8C
                              • __dosmaperr.LIBCMT ref: 00455D95
                              • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                              • CloseHandle.KERNEL32(?), ref: 00455EFF
                              • GetLastError.KERNEL32 ref: 00455F31
                              • __dosmaperr.LIBCMT ref: 00455F38
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                              • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                              • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                              • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: \&G$\&G$`&G
                              • API String ID: 269201875-253610517
                              • Opcode ID: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                              • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                              • Opcode Fuzzy Hash: 4c79e0627c8f19053a14b01c9d065665146560bb3788e30f1103ba49badb8175
                              • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 65535$udp
                              • API String ID: 0-1267037602
                              • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                              • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                              • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                              • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                              APIs
                              • OpenClipboard.USER32 ref: 0041697C
                              • EmptyClipboard.USER32 ref: 0041698A
                              • CloseClipboard.USER32 ref: 00416990
                              • OpenClipboard.USER32 ref: 00416997
                              • GetClipboardData.USER32(0000000D), ref: 004169A7
                              • GlobalLock.KERNEL32(00000000), ref: 004169B0
                              • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                              • CloseClipboard.USER32 ref: 004169BF
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                              • String ID: !D@$xdF
                              • API String ID: 2172192267-3540039394
                              • Opcode ID: 1dc801b19e497491b67ae579bb562dc85b8fb37bca759ab43bd6e47342784dcc
                              • Instruction ID: 51ec5b3583c04982a71d168622c94cade283f75070810aedfe93923cca0dc87c
                              • Opcode Fuzzy Hash: 1dc801b19e497491b67ae579bb562dc85b8fb37bca759ab43bd6e47342784dcc
                              • Instruction Fuzzy Hash: 41014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                              • GetLastError.KERNEL32(?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                              • __dosmaperr.LIBCMT ref: 0043A926
                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                              • GetLastError.KERNEL32(?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                              • __dosmaperr.LIBCMT ref: 0043A963
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401BD9,?), ref: 0043A9A6
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00401BD9,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                              • __dosmaperr.LIBCMT ref: 0043A9B7
                              • _free.LIBCMT ref: 0043A9C3
                              • _free.LIBCMT ref: 0043A9CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                              • String ID:
                              • API String ID: 2441525078-0
                              • Opcode ID: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                              • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                              • Opcode Fuzzy Hash: 289d0842b92f941f4feb2be478b72c6b1387c4c53bdf58ebb9c1b022d59fa5b6
                              • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                              APIs
                              • SetEvent.KERNEL32(?,?), ref: 004054BF
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                              • TranslateMessage.USER32(?), ref: 0040557E
                              • DispatchMessageA.USER32(?), ref: 00405589
                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F88), ref: 00405641
                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                              • String ID: CloseChat$DisplayMessage$GetMessage
                              • API String ID: 2956720200-749203953
                              • Opcode ID: 6b32a15a7d9edcc84a1633b6e772a028678d047f517eb479d5bd87b6de943de9
                              • Instruction ID: af141abdc89e6f99b360bf73ca1bd21391e8bea30a055eafc68b1e1601de11b4
                              • Opcode Fuzzy Hash: 6b32a15a7d9edcc84a1633b6e772a028678d047f517eb479d5bd87b6de943de9
                              • Instruction Fuzzy Hash: 6F419E71604301ABCB14FB76DC5A86F37A9AB85704F40493EF516A32E1EF3C8905CB9A
                              APIs
                                • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                              • CloseHandle.KERNEL32(00000000), ref: 00417E20
                              • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                              • String ID: <$@$@VG$@VG$Temp
                              • API String ID: 1704390241-1291085672
                              • Opcode ID: 48174c96874ddb1bc79234c66e05c6785ff65f59bcf2873874e0dc4e48980577
                              • Instruction ID: 17e4c8e037c7e297ff37edeb8814921eaebe5ca95f3622e3753009d7d6553322
                              • Opcode Fuzzy Hash: 48174c96874ddb1bc79234c66e05c6785ff65f59bcf2873874e0dc4e48980577
                              • Instruction Fuzzy Hash: 15417E319002199ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                              APIs
                              • GetCurrentProcess.KERNEL32(00472B28,00000000,RGw@,00003000,00000004,00000000,00000001), ref: 00407418
                              • GetCurrentProcess.KERNEL32(00472B28,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe), ref: 004074D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CurrentProcess
                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir$RGw@
                              • API String ID: 2050909247-1783200977
                              • Opcode ID: 1a1eb9634b651143de70fee5b7a2289a57af99024fb0b6e7e4d2875ac9661c3b
                              • Instruction ID: b8c3dc73ce560081c95a6921e0e4b034ac7c55c8f908ce4a4bfc67d5bc942e58
                              • Opcode Fuzzy Hash: 1a1eb9634b651143de70fee5b7a2289a57af99024fb0b6e7e4d2875ac9661c3b
                              • Instruction Fuzzy Hash: 7631C271604700ABD311EF65DE46F1677A8FB48315F10087EF509E6292DBB8B8418B6E
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                              • int.LIBCPMT ref: 00410EBC
                                • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                              • std::_Facet_Register.LIBCPMT ref: 00410EFC
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                              • __Init_thread_footer.LIBCMT ref: 00410F64
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                              • String ID: <kG$@!G$@kG
                              • API String ID: 3815856325-4100743575
                              • Opcode ID: 92c60c4b3aca24074658904995ff5281d88556c34e2f97828f11a1926fe6b537
                              • Instruction ID: 0588f859592fb32d2b707c82d02c9514845f82bff388d80d729849e078334d39
                              • Opcode Fuzzy Hash: 92c60c4b3aca24074658904995ff5281d88556c34e2f97828f11a1926fe6b537
                              • Instruction Fuzzy Hash: 622107329005249BCB14FBAAD8429DE7769DF48324F21416FF904E72D1DBB9AD818BDC
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: f3cbb515e58a4fb37b38339a7557c8d97296d1e23fa900708d81cf8e9cd3026f
                              • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                              • Opcode Fuzzy Hash: f3cbb515e58a4fb37b38339a7557c8d97296d1e23fa900708d81cf8e9cd3026f
                              • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                              APIs
                              • _free.LIBCMT ref: 004481B5
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 004481C1
                              • _free.LIBCMT ref: 004481CC
                              • _free.LIBCMT ref: 004481D7
                              • _free.LIBCMT ref: 004481E2
                              • _free.LIBCMT ref: 004481ED
                              • _free.LIBCMT ref: 004481F8
                              • _free.LIBCMT ref: 00448203
                              • _free.LIBCMT ref: 0044820E
                              • _free.LIBCMT ref: 0044821C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                              • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                              • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                              • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                              APIs
                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                              • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                              Strings
                              • DisplayName, xrefs: 0041C7CD
                              • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 0041C738
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumOpen
                              • String ID: DisplayName$Software\Microsoft\Windows\CurrentVersion\Uninstall
                              • API String ID: 1332880857-3614651759
                              • Opcode ID: 0758d2217d4cdf4be18b27332201ce298183b926a753a4e26667fde6bb3e7a3c
                              • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                              • Opcode Fuzzy Hash: 0758d2217d4cdf4be18b27332201ce298183b926a753a4e26667fde6bb3e7a3c
                              • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                              APIs
                              • __EH_prolog.LIBCMT ref: 0041A04A
                              • GdiplusStartup.GDIPLUS(00474AE0,?,00000000), ref: 0041A07C
                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                              • Sleep.KERNEL32(000003E8), ref: 0041A18E
                              • GetLocalTime.KERNEL32(?), ref: 0041A196
                              • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                              • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                              • API String ID: 489098229-3790400642
                              • Opcode ID: 49b368db4e9e7e60bbeb8abd80ae96f82f19b5c1f99d9777cf0882a092ba5413
                              • Instruction ID: ac563f1b8c988fbcbdb25ffa0f060f034023d1de15a29d9718e9897573209577
                              • Opcode Fuzzy Hash: 49b368db4e9e7e60bbeb8abd80ae96f82f19b5c1f99d9777cf0882a092ba5413
                              • Instruction Fuzzy Hash: 3F518E70A00215AACB14BBB5C8529FD77A9AF54308F40403FF509AB1E2EF7C4D85C799
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                              • Sleep.KERNEL32(00000064), ref: 0041755C
                              • DeleteFileW.KERNEL32(00000000), ref: 00417590
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CreateDeleteExecuteShellSleep
                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                              • API String ID: 1462127192-2001430897
                              • Opcode ID: 75ba52ee80e69cc178f2168560c26bce616c6197954303228b51d7ffb0a96f88
                              • Instruction ID: 4d831fdf2c11e0d815db77489a542135a470e493f6e320739c61594aa9f7fbeb
                              • Opcode Fuzzy Hash: 75ba52ee80e69cc178f2168560c26bce616c6197954303228b51d7ffb0a96f88
                              • Instruction Fuzzy Hash: A4313D71940119AADB04FBA1DC96DED7739AF50309F00017EF606731E2EF785A8ACA9C
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                              • lstrcpynA.KERNEL32(00474B70,Remcos,00000080), ref: 0041D558
                              • Shell_NotifyIconA.SHELL32(00000000,00474B58), ref: 0041D56E
                              • TranslateMessage.USER32(?), ref: 0041D57A
                              • DispatchMessageA.USER32(?), ref: 0041D584
                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                              • String ID: Remcos
                              • API String ID: 1970332568-165870891
                              • Opcode ID: 731e0475cdd51c62647780fa2fa3280f65193767bc99efc51189d173a824088e
                              • Instruction ID: c2fc9e39e559a2afed00746d39c192473857db467f2681b349ddfe36236392a3
                              • Opcode Fuzzy Hash: 731e0475cdd51c62647780fa2fa3280f65193767bc99efc51189d173a824088e
                              • Instruction Fuzzy Hash: 11015EB1840348EBD7109FA1EC4CFABBBBCABC5705F00406AF505921A1D7B8E885CB6D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                              • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                              • Opcode Fuzzy Hash: ed6e8dde3cdd9862c5be3ded71a2773307dc59359bf90b76219a4653831d67c7
                              • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                              APIs
                              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                              • __alloca_probe_16.LIBCMT ref: 00453F6A
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                              • __alloca_probe_16.LIBCMT ref: 00454014
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                              • __freea.LIBCMT ref: 00454083
                              • __freea.LIBCMT ref: 0045408F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 201697637-0
                              • Opcode ID: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                              • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                              • Opcode Fuzzy Hash: d666079201eac34123aff993431e960db56ae36dfd708acf9a18ada5241d4519
                              • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                              APIs
                                • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                              • _memcmp.LIBVCRUNTIME ref: 004454A4
                              • _free.LIBCMT ref: 00445515
                              • _free.LIBCMT ref: 0044552E
                              • _free.LIBCMT ref: 00445560
                              • _free.LIBCMT ref: 00445569
                              • _free.LIBCMT ref: 00445575
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorLast$_abort_memcmp
                              • String ID: C
                              • API String ID: 1679612858-1037565863
                              • Opcode ID: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                              • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                              • Opcode Fuzzy Hash: 270cf3bb6288f401d2b81aec4bec5e705b2579f2f1b63f3c4bd6d63e951100ee
                              • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: tcp$udp
                              • API String ID: 0-3725065008
                              • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                              • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                              • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                              • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Eventinet_ntoa
                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                              • API String ID: 3578746661-168337528
                              • Opcode ID: cd63921f088e83ba9da4e353d12a1131c53bef29bbc70149d688d9738fd639a4
                              • Instruction ID: cd9a01f22de2d9f6a9994d78948339ea64d6c0f71f497d0a384e35af32d82467
                              • Opcode Fuzzy Hash: cd63921f088e83ba9da4e353d12a1131c53bef29bbc70149d688d9738fd639a4
                              • Instruction Fuzzy Hash: 0E51C531A042015BC724FB36D95AAAE36A5AB80344F40453FF606576F2EF7C8985C7DE
                              APIs
                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EF0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                              • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474F08,00404C49,00000000,00000000,00000000,?,00474F08,?), ref: 00404BA5
                                • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                              • String ID: .part
                              • API String ID: 1303771098-3499674018
                              • Opcode ID: 2150a189df16d023aaea6f06597ff48a5e6b6566d5180279f80c020d780b3e8b
                              • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                              • Opcode Fuzzy Hash: 2150a189df16d023aaea6f06597ff48a5e6b6566d5180279f80c020d780b3e8b
                              • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                              APIs
                              • _strftime.LIBCMT ref: 00401BD4
                                • Part of subcall function 00401CE9: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401D55
                              • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401C86
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CC4
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CD3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                              • String ID: %Y-%m-%d %H.%M$.wav$tMG
                              • API String ID: 3809562944-3627046146
                              • Opcode ID: 774d76beef9008db32f03f03aba53f46b293a4d454c50c356403b75a824fba62
                              • Instruction ID: 77224d9c3c18060e3821781750c24aeed92f5db76bec914a8a88ddbccf287b9a
                              • Opcode Fuzzy Hash: 774d76beef9008db32f03f03aba53f46b293a4d454c50c356403b75a824fba62
                              • Instruction Fuzzy Hash: 5F3181315043019FC325EB62DD46A9A77A8FB84319F40443EF149A31F2EFB89949CB9A
                              APIs
                              • AllocConsole.KERNEL32(00475348), ref: 0041CE35
                              • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                              • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$Window$AllocOutputShow
                              • String ID: Remcos v$5.2.0 Pro$CONOUT$
                              • API String ID: 4067487056-793934204
                              • Opcode ID: 4ac208d8a2a9dd681627466f3850d62ccb8bf7ad48dd9727624a0f6f50ade13e
                              • Instruction ID: a031bdd2f27af694b11ce09d1e3c688e218bb3586dee27dfc95755d0e541b829
                              • Opcode Fuzzy Hash: 4ac208d8a2a9dd681627466f3850d62ccb8bf7ad48dd9727624a0f6f50ade13e
                              • Instruction Fuzzy Hash: 2D014471A80304BBD610F7F19D8BF9EB7AC9B18B05F500527BA04A70D2EB6DD944466E
                              Strings
                              • xdF, xrefs: 004076E4
                              • C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, xrefs: 004076FF
                              • RG, xrefs: 004076DF
                              • 0SG, xrefs: 00407715
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: 0SG$C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$xdF$RG
                              • API String ID: 0-126781612
                              • Opcode ID: bfa82963eea25e7f3a1000047237d0892740d3b416b353ce1bd886ed4ccf4a83
                              • Instruction ID: 8e81a4762a03630119b5543cf4782e43f3d691fcab72f30749e56a9243805afb
                              • Opcode Fuzzy Hash: bfa82963eea25e7f3a1000047237d0892740d3b416b353ce1bd886ed4ccf4a83
                              • Instruction Fuzzy Hash: 08F0F6B0A14141ABCB1067355D286AA3756A784397F00487BF547FB2F2EBBD5C82861E
                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                              • __alloca_probe_16.LIBCMT ref: 0044AD5B
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                              • __alloca_probe_16.LIBCMT ref: 0044AE40
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                              • __freea.LIBCMT ref: 0044AEB0
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              • __freea.LIBCMT ref: 0044AEB9
                              • __freea.LIBCMT ref: 0044AEDE
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                              • String ID:
                              • API String ID: 3864826663-0
                              • Opcode ID: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                              • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                              • Opcode Fuzzy Hash: b8cd4310d0de59be5354cf63c717d249675af8b9c8b383ed5ef79fab109b86d3
                              • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                              APIs
                              • SendInput.USER32 ref: 00419A25
                              • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                              • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                              • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: InputSend$Virtual
                              • String ID:
                              • API String ID: 1167301434-0
                              • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                              • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                              • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                              • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: __freea$__alloca_probe_16_free
                              • String ID: a/p$am/pm$h{D
                              • API String ID: 2936374016-2303565833
                              • Opcode ID: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                              • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                              • Opcode Fuzzy Hash: 3f6e07506486b6d7dbef2a606a64f0e75de21b8703f606ba4f5b284e1050ed44
                              • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                              APIs
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              • _free.LIBCMT ref: 00444E87
                              • _free.LIBCMT ref: 00444E9E
                              • _free.LIBCMT ref: 00444EBD
                              • _free.LIBCMT ref: 00444ED8
                              • _free.LIBCMT ref: 00444EEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$AllocateHeap
                              • String ID: KED
                              • API String ID: 3033488037-2133951994
                              • Opcode ID: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                              • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                              • Opcode Fuzzy Hash: dfa49ca82d32c8382211b9fb73ae343eb5cb7a7eabed5eea37687c7cf3770045
                              • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                              APIs
                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                              • __fassign.LIBCMT ref: 0044B4F9
                              • __fassign.LIBCMT ref: 0044B514
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                              • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                              • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                              • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                              • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                              APIs
                              • __Init_thread_footer.LIBCMT ref: 004018BE
                              • ExitThread.KERNEL32 ref: 004018F6
                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EF0,00000000), ref: 00401A04
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                              • String ID: `kG$hMG$kG
                              • API String ID: 1649129571-3851552405
                              • Opcode ID: bbb6071c9ea14adf7626c7ec0083835009cb07dc03078068e0e8a1964e8e16ce
                              • Instruction ID: dc699b77c08b599092ddf19de7d80486fcd8c0a7edd7622242773fc29a9484b7
                              • Opcode Fuzzy Hash: bbb6071c9ea14adf7626c7ec0083835009cb07dc03078068e0e8a1964e8e16ce
                              • Instruction Fuzzy Hash: 3441C2312042009BC324FB36DD96ABE73A6AB85354F00453FF54AA61F1DF38AD4AC61E
                              APIs
                                • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750F4), ref: 00413678
                                • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                              • _wcslen.LIBCMT ref: 0041B7F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                              • String ID: .exe$HSG$http\shell\open\command$program files (x86)\$program files\
                              • API String ID: 3286818993-930133217
                              • Opcode ID: b86b44ed08d52466cfc9a3801a6d71745e254f0deb3e8f8ed9e40c284f2e6556
                              • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                              • Opcode Fuzzy Hash: b86b44ed08d52466cfc9a3801a6d71745e254f0deb3e8f8ed9e40c284f2e6556
                              • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                              APIs
                                • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00413622
                                • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                              • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                              • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                              • API String ID: 1133728706-4073444585
                              • Opcode ID: 843c2792490c415675bf65c4a99ba9f5f0d8af7c59c89c7c6863f9d3e9c49b14
                              • Instruction ID: 7718d61ab729039ae94473664947c91a52367f601ff6055b29c84dcba8ed2574
                              • Opcode Fuzzy Hash: 843c2792490c415675bf65c4a99ba9f5f0d8af7c59c89c7c6863f9d3e9c49b14
                              • Instruction Fuzzy Hash: E7215230A40219A6CB14F7F1CC969EE7729AF50744F80017FE502B71D1EB7D6945C6DA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                              • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                              • Opcode Fuzzy Hash: 3e1437a1f94eb298758500833f4fd37ec9f384a351c1712870bfe34c5990e753
                              • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                              APIs
                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401A7D
                              • waveInOpen.WINMM(00472AC0,000000FF,00472AC8,Function_00001B8F,00000000,00000000,00000024), ref: 00401B13
                              • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401B67
                              • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401B76
                              • waveInStart.WINMM ref: 00401B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                              • String ID: tMG
                              • API String ID: 1356121797-30866661
                              • Opcode ID: a32bf82f151408e5f3abe306aa4422ab47744250154bd8f7e0bff8bea5466356
                              • Instruction ID: cbef553d477d36f78321a165484ecc4410fcecc505b8f9aca62d01b994c6c3e6
                              • Opcode Fuzzy Hash: a32bf82f151408e5f3abe306aa4422ab47744250154bd8f7e0bff8bea5466356
                              • Instruction Fuzzy Hash: 8E2148716042019FC7299F6AEE09A697BAAFB84711B04403EE10DD76F1DBF848C5CB2C
                              APIs
                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                              • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                              • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                              Strings
                              • http://geoplugin.net/json.gp, xrefs: 0041B448
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleOpen$FileRead
                              • String ID: http://geoplugin.net/json.gp
                              • API String ID: 3121278467-91888290
                              • Opcode ID: cc18b0f60563c6ad6f9a26d76095e6aabadcdc754726bec99fffa54df7cc8bd2
                              • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                              • Opcode Fuzzy Hash: cc18b0f60563c6ad6f9a26d76095e6aabadcdc754726bec99fffa54df7cc8bd2
                              • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                              APIs
                                • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                              • _free.LIBCMT ref: 00450FC8
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00450FD3
                              • _free.LIBCMT ref: 00450FDE
                              • _free.LIBCMT ref: 00451032
                              • _free.LIBCMT ref: 0045103D
                              • _free.LIBCMT ref: 00451048
                              • _free.LIBCMT ref: 00451053
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                              • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                              • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                              • int.LIBCPMT ref: 004111BE
                                • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                              • std::_Facet_Register.LIBCPMT ref: 004111FE
                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                              • String ID: 8mG
                              • API String ID: 2536120697-3990007011
                              • Opcode ID: 14799048d37b477e6c40f7e8d4f0e89b1ed2b05bcd10956721a24fc1261bb2b4
                              • Instruction ID: 3a14b803bc510f5ed1108d30ac07207671fc4f07faef22c9ffd8c11cb1ae2def
                              • Opcode Fuzzy Hash: 14799048d37b477e6c40f7e8d4f0e89b1ed2b05bcd10956721a24fc1261bb2b4
                              • Instruction Fuzzy Hash: D3112332900124A7CB14EBAAD8018DEBBA99F44364F11456FFE04B72E1DB789E41CBD8
                              APIs
                              • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                              • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                              • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                              • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                              • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                              APIs
                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe), ref: 0040760B
                                • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                              • CoUninitialize.OLE32 ref: 00407664
                              Strings
                              • [+] before ShellExec, xrefs: 0040762C
                              • [+] ShellExec success, xrefs: 00407649
                              • C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe, xrefs: 004075EB, 004075EE, 00407640
                              • [+] ucmCMLuaUtilShellExecMethod, xrefs: 004075F0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: InitializeObjectUninitialize_wcslen
                              • String ID: C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                              • API String ID: 3851391207-3051973832
                              • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                              • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                              • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                              • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                              APIs
                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                              • GetLastError.KERNEL32 ref: 0040BB22
                              Strings
                              • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                              • UserProfile, xrefs: 0040BAE8
                              • [Chrome Cookies not found], xrefs: 0040BB3C
                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteErrorFileLast
                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                              • API String ID: 2018770650-304995407
                              • Opcode ID: 7bdd53de2c7ce75327e0ce8a061dea47c63620c1b54bd56443db715df27270fd
                              • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                              • Opcode Fuzzy Hash: 7bdd53de2c7ce75327e0ce8a061dea47c63620c1b54bd56443db715df27270fd
                              • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                              APIs
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                              • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                              • Sleep.KERNEL32(00002710), ref: 0041AE98
                              • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: PlaySound$HandleLocalModuleSleepTime
                              • String ID: Alarm triggered$`Wu
                              • API String ID: 614609389-1738255680
                              • Opcode ID: 3a0a6838436f72e464f3f9b922c545e7727b8fea0b38228e9900d288e1fe9cfd
                              • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                              • Opcode Fuzzy Hash: 3a0a6838436f72e464f3f9b922c545e7727b8fea0b38228e9900d288e1fe9cfd
                              • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                              APIs
                              • __allrem.LIBCMT ref: 0043ACE9
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                              • __allrem.LIBCMT ref: 0043AD1C
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                              • __allrem.LIBCMT ref: 0043AD51
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                              • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                              • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                              • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                              APIs
                              • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: H_prologSleep
                              • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera$XNG
                              • API String ID: 3469354165-985523790
                              • Opcode ID: 07df79d1def3ea8d0f0114adccc6152b0d50d4d25af5b96514c935137a49def7
                              • Instruction ID: 7593a199e81997f2aad1dc538160579efde4e563a54277089fa649d8e7e3dbe8
                              • Opcode Fuzzy Hash: 07df79d1def3ea8d0f0114adccc6152b0d50d4d25af5b96514c935137a49def7
                              • Instruction Fuzzy Hash: 2A51E0B1A042106BCA14FB369D0A66E3655ABC4748F00443FFA09676E2DF7D8E46839E
                              APIs
                                • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                              • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                              • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                              • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                              • String ID:
                              • API String ID: 3950776272-0
                              • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                              • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                              • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                              • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: __cftoe
                              • String ID:
                              • API String ID: 4189289331-0
                              • Opcode ID: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                              • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                              • Opcode Fuzzy Hash: 8a4c5be280cb6c814f8e43a2c8dbee5c21d103d485289201cbd24c59527051e2
                              • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                              • String ID:
                              • API String ID: 493672254-0
                              • Opcode ID: 305a945f5ae16c96e2f06c84d41aa4012af85c485f9c974a0b1ca90fe9e389de
                              • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                              • Opcode Fuzzy Hash: 305a945f5ae16c96e2f06c84d41aa4012af85c485f9c974a0b1ca90fe9e389de
                              • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                              APIs
                              • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                              • _free.LIBCMT ref: 004482CC
                              • _free.LIBCMT ref: 004482F4
                              • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                              • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                              • _abort.LIBCMT ref: 00448313
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                              • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                              • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                              • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 8eb54fa1672786e09d2219133f0626536d5b5b39631990794a881cefe09f2d9d
                              • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                              • Opcode Fuzzy Hash: 8eb54fa1672786e09d2219133f0626536d5b5b39631990794a881cefe09f2d9d
                              • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: 7d40cec447ae271724922458aab5fd3d84dbec4ea928b02c1f03fd5bbfed4507
                              • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                              • Opcode Fuzzy Hash: 7d40cec447ae271724922458aab5fd3d84dbec4ea928b02c1f03fd5bbfed4507
                              • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                              APIs
                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Service$CloseHandle$Open$ControlManager
                              • String ID:
                              • API String ID: 221034970-0
                              • Opcode ID: a0f35f664dbda9af56b5a5da66da559fb3e9fc57b8559f966e995c2fd7636ff5
                              • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                              • Opcode Fuzzy Hash: a0f35f664dbda9af56b5a5da66da559fb3e9fc57b8559f966e995c2fd7636ff5
                              • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                              APIs
                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                              • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEnumInfoOpenQuerysend
                              • String ID: (aF$,aF$xdF
                              • API String ID: 3114080316-1322504040
                              • Opcode ID: ac1c0617193354b7a3cd5a1638e8446e34a490446e52514598ccc834b66f2a2c
                              • Instruction ID: 9135d8dbad86ad48596e871537d7b2906c3d36c2a7f97e2d86650b4d09e6d137
                              • Opcode Fuzzy Hash: ac1c0617193354b7a3cd5a1638e8446e34a490446e52514598ccc834b66f2a2c
                              • Instruction Fuzzy Hash: E341A0316082406AC324FB26D852AEF72A59FD1348F80883FF54A671D6EF7C5D49866E
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe,00000104), ref: 00443515
                              • _free.LIBCMT ref: 004435E0
                              • _free.LIBCMT ref: 004435EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: 8({$C:\Users\user\Desktop\17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f9f24501.dat-decoded.exe
                              • API String ID: 2506810119-4025133569
                              • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                              • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                              • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                              • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                              APIs
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • __Init_thread_footer.LIBCMT ref: 0040B7D2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: [End of clipboard]$[Text copied to clipboard]$ mG$xdF
                              • API String ID: 1881088180-3895790603
                              • Opcode ID: a39ea4b818e0b3528c8bb9c5d7a7518586b356a586ec79917f3024ceca11fa06
                              • Instruction ID: 5c7e69c9d376070a9f10adc198010d279a990252db190bacd7f595afc81a80c0
                              • Opcode Fuzzy Hash: a39ea4b818e0b3528c8bb9c5d7a7518586b356a586ec79917f3024ceca11fa06
                              • Instruction Fuzzy Hash: B5216D31A102198ACB14FBA6D8929EDB375AF54318F10403FE506771E2EF7C6D4ACA8C
                              APIs
                              • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                              • GetLastError.KERNEL32 ref: 0041D611
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ClassCreateErrorLastRegisterWindow
                              • String ID: 0$MsgWindowClass
                              • API String ID: 2877667751-2410386613
                              • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                              • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                              • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                              • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                              APIs
                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                              • CloseHandle.KERNEL32(?), ref: 004077E5
                              • CloseHandle.KERNEL32(?), ref: 004077EA
                              Strings
                              • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseHandle$CreateProcess
                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                              • API String ID: 2922976086-4183131282
                              • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                              • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                              • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                              • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                              APIs
                              • RegCreateKeyW.ADVAPI32(80000001,00000000,RG), ref: 0041385A
                              • RegSetValueExW.ADVAPI32(RG,?,00000000,00000001,00000000,00000000,00475300,?,0040F85E,pth_unenc,004752E8), ref: 00413888
                              • RegCloseKey.ADVAPI32(?,?,0040F85E,pth_unenc,004752E8), ref: 00413893
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseCreateValue
                              • String ID: pth_unenc$RG
                              • API String ID: 1818849710-3487042679
                              • Opcode ID: cbeea3386a39013b062d5e7225ad240eff34055e22739d6872e46d18ef669f40
                              • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                              • Opcode Fuzzy Hash: cbeea3386a39013b062d5e7225ad240eff34055e22739d6872e46d18ef669f40
                              • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                              • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                              • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                              • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                              • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                              • String ID: KeepAlive | Disabled
                              • API String ID: 2993684571-305739064
                              • Opcode ID: a1239bbaa258f2a34943f968a1ba77755cc365037cc61d007e051ef3d6ef4e82
                              • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                              • Opcode Fuzzy Hash: a1239bbaa258f2a34943f968a1ba77755cc365037cc61d007e051ef3d6ef4e82
                              • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                              APIs
                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                              Strings
                              • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                              • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                              • API String ID: 3024135584-2418719853
                              • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                              • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                              • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                              • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                              • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                              • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                              • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                              APIs
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                              • _free.LIBCMT ref: 0044943D
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00449609
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                              • String ID:
                              • API String ID: 1286116820-0
                              • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                              • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                              • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                              • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                              APIs
                                • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                              • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475348), ref: 0041C08B
                                • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475348), ref: 0041C096
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                              • String ID:
                              • API String ID: 2180151492-0
                              • Opcode ID: cc971232e85903e85dcb07b98dc45c03163b8f6709000a1651629fc29ffd0670
                              • Instruction ID: 39de0d33b69ea9088fa68d935cf3ef43cf04ff0480c7130c1a021fac56d243da
                              • Opcode Fuzzy Hash: cc971232e85903e85dcb07b98dc45c03163b8f6709000a1651629fc29ffd0670
                              • Instruction Fuzzy Hash: 8D4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                              • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                              • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                              • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                              • __alloca_probe_16.LIBCMT ref: 00451231
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                              • __freea.LIBCMT ref: 0045129D
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                              • String ID:
                              • API String ID: 313313983-0
                              • Opcode ID: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                              • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                              • Opcode Fuzzy Hash: 695a5f3fdf384fa9d4863fe56c7c43b71593cfbe7e8d533d6dff3d4dffab5c55
                              • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                              APIs
                                • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00475300), ref: 0041374F
                                • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                • Part of subcall function 00413733: RegCloseKey.ADVAPI32(00000000), ref: 00413773
                              • Sleep.KERNEL32(00000BB8), ref: 004127B5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenQuerySleepValue
                              • String ID: HSG$exepath$xdF$RG
                              • API String ID: 4119054056-3038920021
                              • Opcode ID: 7497c871da16a85cd3abae36a8f31de7ae50e170984148cfe4815c70ed9a6ca7
                              • Instruction ID: 7f535f989f64e3217726da85717e45219a172cbdcd35e6ae3f2d68e0f7be43ad
                              • Opcode Fuzzy Hash: 7497c871da16a85cd3abae36a8f31de7ae50e170984148cfe4815c70ed9a6ca7
                              • Instruction Fuzzy Hash: 1F21D8A1B043042BD604B7365D4AAAF724D8B80358F40897FBA56E73D3EEBD9C45826D
                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                              • _free.LIBCMT ref: 0044F43F
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                              • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                              • Opcode Fuzzy Hash: 5a321bf6ad982bb41f22afd847bffa7b7f2aa598f804dd442cdb837d811de21f
                              • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                              APIs
                              • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                              • _free.LIBCMT ref: 00448353
                              • _free.LIBCMT ref: 0044837A
                              • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                              • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                              • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                              • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                              • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                              APIs
                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CloseHandleOpen$FileImageName
                              • String ID:
                              • API String ID: 2951400881-0
                              • Opcode ID: ba3ea50cb646477030606071dcac17ec13321efbd804a8471714c0f1fa06d59f
                              • Instruction ID: eb9e11a2b0883253d54455b1eb0df9c10e535dd1e95c930e162dea6fb874dde8
                              • Opcode Fuzzy Hash: ba3ea50cb646477030606071dcac17ec13321efbd804a8471714c0f1fa06d59f
                              • Instruction Fuzzy Hash: 2F01F231680215ABD71066949C8AFA7B66C8B84756F0001ABFA08D2292EE74CD81466A
                              APIs
                              • _free.LIBCMT ref: 00450A54
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00450A66
                              • _free.LIBCMT ref: 00450A78
                              • _free.LIBCMT ref: 00450A8A
                              • _free.LIBCMT ref: 00450A9C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                              • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                              • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                              APIs
                              • _free.LIBCMT ref: 00444106
                                • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                              • _free.LIBCMT ref: 00444118
                              • _free.LIBCMT ref: 0044412B
                              • _free.LIBCMT ref: 0044413C
                              • _free.LIBCMT ref: 0044414D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                              • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                              • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                              APIs
                              • GetWindowThreadProcessId.USER32(?,?), ref: 0041763E
                              • GetWindowTextW.USER32(?,?,0000012C), ref: 00417670
                              • IsWindowVisible.USER32(?), ref: 00417677
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProcessWindow$Open$TextThreadVisible
                              • String ID: (VG
                              • API String ID: 3142014140-3443974315
                              • Opcode ID: 64c4c79acca52ea4531920db9dbb0c05ac433bd32e4c868eca6de782b819fe95
                              • Instruction ID: 57afc706987f0d359dfa573bc041c79e98ae29994c94316b8148008c339bd05b
                              • Opcode Fuzzy Hash: 64c4c79acca52ea4531920db9dbb0c05ac433bd32e4c868eca6de782b819fe95
                              • Instruction Fuzzy Hash: 6E7109311082419AC365FB22D8959EFB3E5BFD4308F50493FF18A560E5EF746A49CB8A
                              APIs
                              • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                              • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Enum$InfoQueryValue
                              • String ID: [regsplt]
                              • API String ID: 3554306468-4262303796
                              • Opcode ID: 4bb421e81305ae9daa57f9350c6a419e3f1726580913331d7171474a5fae720e
                              • Instruction ID: fa843d34e07254c46a29a5d4d7bbb73928c81f50e0ccc4a220fcc0531dc04ae2
                              • Opcode Fuzzy Hash: 4bb421e81305ae9daa57f9350c6a419e3f1726580913331d7171474a5fae720e
                              • Instruction Fuzzy Hash: DF512C72900219AADB11EB95DC86EEEB77DAF04304F1000BAE505F6191EF746B48CBA9
                              APIs
                              • _strpbrk.LIBCMT ref: 0044E7B8
                              • _free.LIBCMT ref: 0044E8D5
                                • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                              • String ID: *?$.
                              • API String ID: 2812119850-3972193922
                              • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                              • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                              • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                              • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CountEventTick
                              • String ID: !D@$,aF
                              • API String ID: 180926312-3317875915
                              • Opcode ID: abb289598e30de7ee6c013fbc62628b71413331ebe1edfe4c49353a1112ff30c
                              • Instruction ID: a18c2cf71696728a803f4d48a8d0c2278a59ecc2ec6ff56e3a85b819d46b2ac8
                              • Opcode Fuzzy Hash: abb289598e30de7ee6c013fbc62628b71413331ebe1edfe4c49353a1112ff30c
                              • Instruction Fuzzy Hash: 4F51B6315082019AC724FB32D852AFF73A5AF94304F50483FF546671E2EF3C5945C68A
                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,75573530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,00475300), ref: 0041BA30
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                              • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                              • String ID: /sort "Visit Time" /stext "$@NG
                              • API String ID: 368326130-3944316004
                              • Opcode ID: 224469ff984c8010abbfb6a0adb632b57bdffdcff036d90cee6eba18a73402bb
                              • Instruction ID: 88307c0d9f74f86904655d2c31cb74d6ebeba16a9e6c7dae8368527950f1c452
                              • Opcode Fuzzy Hash: 224469ff984c8010abbfb6a0adb632b57bdffdcff036d90cee6eba18a73402bb
                              • Instruction Fuzzy Hash: EB316171A001195ACB15FBA6DC969ED7375AF90308F00007FF60AB71E2EF785E49CA99
                              APIs
                                • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                              Strings
                              • User Data\Default\Network\Cookies, xrefs: 0040C63E
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: 97a5ada962bae72897b7f94b11cd40aa52c1d6f994a23f407ee9340b66b1d139
                              • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                              • Opcode Fuzzy Hash: 97a5ada962bae72897b7f94b11cd40aa52c1d6f994a23f407ee9340b66b1d139
                              • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                              APIs
                                • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                              Strings
                              • User Data\Default\Network\Cookies, xrefs: 0040C70D
                              • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                              • API String ID: 1174141254-1980882731
                              • Opcode ID: e30cb4288211014db5c272c31aa753e5001111b8c3c97bf560fde133b4847c17
                              • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                              • Opcode Fuzzy Hash: e30cb4288211014db5c272c31aa753e5001111b8c3c97bf560fde133b4847c17
                              • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                              APIs
                              • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                              • wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: EventLocalTimewsprintf
                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                              • API String ID: 1497725170-1359877963
                              • Opcode ID: 1617756d2e0d850ea55a29bfc092f46bbe0a1a97c42cd607e6c9a213d00bb9e1
                              • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                              • Opcode Fuzzy Hash: 1617756d2e0d850ea55a29bfc092f46bbe0a1a97c42cd607e6c9a213d00bb9e1
                              • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                              APIs
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                              • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateThread$LocalTime$wsprintf
                              • String ID: Online Keylogger Started
                              • API String ID: 112202259-1258561607
                              • Opcode ID: a7321385670445bfa9baf585f8c9fa904332ec5059089b328e401a783e90a250
                              • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                              • Opcode Fuzzy Hash: a7321385670445bfa9baf585f8c9fa904332ec5059089b328e401a783e90a250
                              • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                              APIs
                              • CloseHandle.KERNEL32(00000000,00000000,0040F3F6,?,0044BD0A,0040F3F6,0046EBC0,0000000C), ref: 0044BE42
                              • GetLastError.KERNEL32(?,0044BD0A,0040F3F6,0046EBC0,0000000C), ref: 0044BE4C
                              • __dosmaperr.LIBCMT ref: 0044BE77
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseErrorHandleLast__dosmaperr
                              • String ID: @r}
                              • API String ID: 2583163307-3160818215
                              • Opcode ID: ab3bdfcabf878abbb2a2aeea4d5a33dbce79a0e4a90767e54580a22618b404bc
                              • Instruction ID: c640735ad7e51643fe6b0a0a71fefea3e0d0f945221813f090adf85c72c27ea1
                              • Opcode Fuzzy Hash: ab3bdfcabf878abbb2a2aeea4d5a33dbce79a0e4a90767e54580a22618b404bc
                              • Instruction Fuzzy Hash: AC01483260066866E624623858457BF6789CBC2739F35022FFE18872C3DF6CCC8181D9
                              APIs
                              • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                              • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: CryptUnprotectData$crypt32
                              • API String ID: 2574300362-2380590389
                              • Opcode ID: b88f03605d096aaa2152f3ebf69acb5fe9b1e31435291808458d2189a413eed3
                              • Instruction ID: 345ee013d26fc91f442c93551971226c597518e80cf45168a44a65f4e30a47e9
                              • Opcode Fuzzy Hash: b88f03605d096aaa2152f3ebf69acb5fe9b1e31435291808458d2189a413eed3
                              • Instruction Fuzzy Hash: 1D01F575A00215BBCB18CFAC8C409AF7BB8EB85300F0041BEE94AE3381DA34AD00CB94
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                              • CloseHandle.KERNEL32(?), ref: 004051CA
                              • SetEvent.KERNEL32(?), ref: 004051D9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandleObjectSingleWait
                              • String ID: Connection Timeout
                              • API String ID: 2055531096-499159329
                              • Opcode ID: aea94675e7c534c52cb53f54c205b860b10a02e3c4213e765d5fd14c325240d7
                              • Instruction ID: 0252d74fe4ede7253ae2eff4a1d35319ac7a80acec65437dc80477e116da68d3
                              • Opcode Fuzzy Hash: aea94675e7c534c52cb53f54c205b860b10a02e3c4213e765d5fd14c325240d7
                              • Instruction Fuzzy Hash: 4A01F530A40F00AFD7216F368D8642BBFE0EB00306704093FE68356AE2D6789800CF89
                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Exception@8Throw
                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                              • API String ID: 2005118841-1866435925
                              • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                              • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                              • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                              • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                              APIs
                              • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                              • String ID: bad locale name
                              • API String ID: 3628047217-1405518554
                              • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                              • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                              • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                              • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                              APIs
                              • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                              • ShowWindow.USER32(00000009), ref: 00416C9C
                              • SetForegroundWindow.USER32 ref: 00416CA8
                                • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475348), ref: 0041CE35
                                • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                              • String ID: !D@
                              • API String ID: 186401046-604454484
                              • Opcode ID: a068d85ce6d20572725b561f13a14384616ca358d13cf0a9e2740917865bf9e7
                              • Instruction ID: b1493b377ee00385912555b1a5c9642ee05cd41efde33f67b603c236d656be44
                              • Opcode Fuzzy Hash: a068d85ce6d20572725b561f13a14384616ca358d13cf0a9e2740917865bf9e7
                              • Instruction Fuzzy Hash: 81F03A70148340AAD720AF65ED55BBABB69EB54301F01487BFA09C20F2DB389C94869E
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: /C $cmd.exe$open
                              • API String ID: 587946157-3896048727
                              • Opcode ID: f44f3a75cb8e05523d561960cc0be4386eb784bc6dcc6058ee8d5990d9ea8ce9
                              • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                              • Opcode Fuzzy Hash: f44f3a75cb8e05523d561960cc0be4386eb784bc6dcc6058ee8d5990d9ea8ce9
                              • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                              APIs
                              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteDirectoryFileRemove
                              • String ID: pth_unenc$xdF
                              • API String ID: 3325800564-2448381268
                              • Opcode ID: ad03ad6105e2805cf24512cd36e8b9a34d70bf8a7d384e6b6b2237e166b151ae
                              • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                              • Opcode Fuzzy Hash: ad03ad6105e2805cf24512cd36e8b9a34d70bf8a7d384e6b6b2237e166b151ae
                              • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                              APIs
                              • TerminateThread.KERNEL32(0040A2B8,00000000,00475300,pth_unenc,0040D0F3,004752E8,00475300,?,pth_unenc), ref: 0040B8F6
                              • UnhookWindowsHookEx.USER32(00475100), ref: 0040B902
                              • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: TerminateThread$HookUnhookWindows
                              • String ID: pth_unenc
                              • API String ID: 3123878439-4028850238
                              • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                              • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                              • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                              • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: __alldvrm$_strrchr
                              • String ID:
                              • API String ID: 1036877536-0
                              • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                              • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                              • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                              • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                              • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                              • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                              • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                              • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                              • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                              • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                              APIs
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F60), ref: 00404DB3
                              • CreateThread.KERNEL32(00000000,00000000,?,00474F08,00000000,00000000), ref: 00404DC7
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                              • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00404DDB
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                              • String ID:
                              • API String ID: 3360349984-0
                              • Opcode ID: 9e0a8eaf4219b775e830663fcb54a959b6233ae16d1ef5de7dcca6256e783451
                              • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                              • Opcode Fuzzy Hash: 9e0a8eaf4219b775e830663fcb54a959b6233ae16d1ef5de7dcca6256e783451
                              • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                              APIs
                              Strings
                              • Cleared browsers logins and cookies., xrefs: 0040C130
                              • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Sleep
                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                              • API String ID: 3472027048-1236744412
                              • Opcode ID: 0eb67f22db26bfbf69fd8d2aa32761b673633ffd036242d8c1b92dd0b17869b7
                              • Instruction ID: a79ddf3c6a5b8d59d799e992b07df0540e48cd861b142758bc1ef4dabba95ae9
                              • Opcode Fuzzy Hash: 0eb67f22db26bfbf69fd8d2aa32761b673633ffd036242d8c1b92dd0b17869b7
                              • Instruction Fuzzy Hash: F631A904648381EDD6116BF514967AB7B824E53744F0886BFB8C8273C3DABA4808C75F
                              APIs
                                • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                              • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                              • Sleep.KERNEL32(00000064), ref: 0040A638
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Window$SleepText$ForegroundLength
                              • String ID: [ $ ]
                              • API String ID: 3309952895-93608704
                              • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                              • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                              • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                              • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: SystemTimes$Sleep__aulldiv
                              • String ID:
                              • API String ID: 188215759-0
                              • Opcode ID: b0079fa80277cdab6546f5ab837447f57eff53afd9c3e38f4d74f1bcd6e8dbc3
                              • Instruction ID: 34fec0fc5de9b46989c99fc374850f6e4511d06c61be9fc580282ef5e3b3a0c9
                              • Opcode Fuzzy Hash: b0079fa80277cdab6546f5ab837447f57eff53afd9c3e38f4d74f1bcd6e8dbc3
                              • Instruction Fuzzy Hash: 4A1142B35043446BC304FBB5CD85DEF77ACEBC4359F040A3EF64A82061EE29EA498695
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                              • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                              • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                              • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                              • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                              • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                              • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                              • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                              • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                              • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                              • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                              • _UnwindNestedFrames.LIBCMT ref: 00439911
                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                              • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                              • String ID:
                              • API String ID: 2633735394-0
                              • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                              • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                              • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                              APIs
                              • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                              • GetSystemMetrics.USER32(0000004D), ref: 00419431
                              • GetSystemMetrics.USER32(0000004E), ref: 00419437
                              • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: MetricsSystem
                              • String ID:
                              • API String ID: 4116985748-0
                              • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                              • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                              • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                              APIs
                              • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                              • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                              • String ID:
                              • API String ID: 1761009282-0
                              • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                              • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                              • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorHandling__start
                              • String ID: pow
                              • API String ID: 3213639722-2276729525
                              • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                              • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                              • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                              • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418AF9
                                • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                              • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                              • String ID: image/jpeg
                              • API String ID: 1291196975-3785015651
                              • Opcode ID: f7762c1077cd22b9d0966c79a8c7972fb49086d0d121f5f9ad0777a9e048a50c
                              • Instruction ID: b1b0a2c635f45e8130f4767810c6fbb161559e0826da6e7acb487c9aae22ef17
                              • Opcode Fuzzy Hash: f7762c1077cd22b9d0966c79a8c7972fb49086d0d121f5f9ad0777a9e048a50c
                              • Instruction Fuzzy Hash: 6D316F72504310AFC701EF65C884D6FB7E9EF8A304F00496EF98597251DB7999048B66
                              APIs
                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: ACP$OCP
                              • API String ID: 0-711371036
                              • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                              • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                              • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                              • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                              APIs
                              • _wcslen.LIBCMT ref: 00416330
                                • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _wcslen$CloseCreateValue
                              • String ID: !D@$okmode
                              • API String ID: 3411444782-1942679189
                              • Opcode ID: ffd0034025ce8a6f256035d87f0428f79cac076b847b20a61f7d23f5852e07e7
                              • Instruction ID: 3691d04bdc76b081f03c0e50e7d604d291fd2bc6213442c77ae478975c73e837
                              • Opcode Fuzzy Hash: ffd0034025ce8a6f256035d87f0428f79cac076b847b20a61f7d23f5852e07e7
                              • Instruction Fuzzy Hash: E211A871B042011BDA187B72D822BBD2296DB84349F80483FF50AAF2E2DFBD4C51535D
                              APIs
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00418BE5
                                • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                              • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00418C0A
                                • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                              • String ID: image/png
                              • API String ID: 1291196975-2966254431
                              • Opcode ID: 5ab440bc048de2cb56d31f74581c152c1f03e682227d906222c769bb8292334a
                              • Instruction ID: f628a6b37c0337dbee8ef7f798de7cbb8cc54a1da061f00231e4b0513ad08027
                              • Opcode Fuzzy Hash: 5ab440bc048de2cb56d31f74581c152c1f03e682227d906222c769bb8292334a
                              • Instruction Fuzzy Hash: 4221C375204211AFC700AB61CC89DBFBBACEFCA314F10452EF54693251DB389945CBA6
                              APIs
                              • GetLocalTime.KERNEL32(?,004755A8,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • GetLocalTime.KERNEL32(?,004755A8,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                              Strings
                              • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: KeepAlive | Enabled | Timeout:
                              • API String ID: 481472006-1507639952
                              • Opcode ID: b04484f53d8468b4d83ba2a2ead289fcf1640922145b27791008477ae1a99032
                              • Instruction ID: b700b38ef9f928670de2390b904a97a1cb71e472754ad5b4355c5e73bb52b66b
                              • Opcode Fuzzy Hash: b04484f53d8468b4d83ba2a2ead289fcf1640922145b27791008477ae1a99032
                              • Instruction Fuzzy Hash: E62104719007806BD710B732A80A76F7B64E755308F44057EE8491B2A2EB7D5988CBDE
                              APIs
                              • Sleep.KERNEL32 ref: 0041667B
                              • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: DownloadFileSleep
                              • String ID: !D@
                              • API String ID: 1931167962-604454484
                              • Opcode ID: 1ca4657709125a85b171c3d25381609667c6d049654dacff53733f257152a229
                              • Instruction ID: 943aba663a6785b3e55a0e29e9dd0f60b42d3502aaa7a5a348319576c1e2766f
                              • Opcode Fuzzy Hash: 1ca4657709125a85b171c3d25381609667c6d049654dacff53733f257152a229
                              • Instruction Fuzzy Hash: 9D1142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                              APIs
                              • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime
                              • String ID: | $%02i:%02i:%02i:%03i
                              • API String ID: 481472006-2430845779
                              • Opcode ID: c84e5cc4d669c1bab3d4613523f9321b462ddfd430bd9aba11072f60c0a42049
                              • Instruction ID: dc1ef91952a31d7701eba46fb19b130c3a81cf04c31882e55cbcd77cf5b9c3d8
                              • Opcode Fuzzy Hash: c84e5cc4d669c1bab3d4613523f9321b462ddfd430bd9aba11072f60c0a42049
                              • Instruction Fuzzy Hash: 72118E714082455AC304EB62D8519BFB3E9AB44308F50093FF88AA21E1EF3CDA45C69E
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: alarm.wav$xYG
                              • API String ID: 1174141254-3120134784
                              • Opcode ID: 6dd5452489ef649c0a1667a96432230bccb5bed30df7701c9f5431fceb379071
                              • Instruction ID: fba4c3df788ebc26406fa6248c5b94d62a9d66ba9cb3dc57f05af0bb44f50ff0
                              • Opcode Fuzzy Hash: 6dd5452489ef649c0a1667a96432230bccb5bed30df7701c9f5431fceb379071
                              • Instruction Fuzzy Hash: 78019E7068831166CA04F77688166EE37559B80318F00847FF64A566E2EFBC9A9586CF
                              APIs
                                • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                              • CloseHandle.KERNEL32(?), ref: 0040B0EF
                              • UnhookWindowsHookEx.USER32 ref: 0040B102
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                              • String ID: Online Keylogger Stopped
                              • API String ID: 1623830855-1496645233
                              • Opcode ID: e9861db579dd6a0832a13b67f6620eafbc60b9ba0201637d04cad77b23535cc3
                              • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                              • Opcode Fuzzy Hash: e9861db579dd6a0832a13b67f6620eafbc60b9ba0201637d04cad77b23535cc3
                              • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                              APIs
                              • waveInPrepareHeader.WINMM(007CED18,00000020,?,?,00476B60,00474EF0,?,00000000,00401A15), ref: 00401849
                              • waveInAddBuffer.WINMM(007CED18,00000020,?,00000000,00401A15), ref: 0040185F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: wave$BufferHeaderPrepare
                              • String ID: hMG
                              • API String ID: 2315374483-350922481
                              • Opcode ID: 2a7237b1c750756b6a557ff6dbb8ae44e7524d5ce161b2fadacf42baadc53798
                              • Instruction ID: 961ac9ec07701b1a047984959549e732b5ed52ade8bfae490fcb5a94ac50a39c
                              • Opcode Fuzzy Hash: 2a7237b1c750756b6a557ff6dbb8ae44e7524d5ce161b2fadacf42baadc53798
                              • Instruction Fuzzy Hash: 46016D71701301AFC7609F75EC449697BA9FF89355701413AF409C77A2EB759C50CB98
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: $G
                              • API String ID: 269201875-4251033865
                              • Opcode ID: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                              • Instruction ID: 4a6f060c21597e0392f33703011e6e0157da39883ddad7ec559e06d861eb6f1f
                              • Opcode Fuzzy Hash: 0435164efccf50aa8117c2daa51ec46fe1437c867187ee89b2aa6ea167946eb6
                              • Instruction Fuzzy Hash: 64E0E532A0152014F6713A3B6D1665B45C68BC1B3AF22423FF425962C2DFAC8946516E
                              APIs
                              • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: LocaleValid
                              • String ID: IsValidLocaleName$kKD
                              • API String ID: 1901932003-3269126172
                              • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                              • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                              • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                              • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Google\Chrome\
                              • API String ID: 1174141254-4188645398
                              • Opcode ID: 4859c672d659d0a1f097c4b87d24339a57335e4ea3a93cd47a728b5256189360
                              • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                              • Opcode Fuzzy Hash: 4859c672d659d0a1f097c4b87d24339a57335e4ea3a93cd47a728b5256189360
                              • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                              • API String ID: 1174141254-2800177040
                              • Opcode ID: f0c0cc8675646142fd89bdb58ed4d14c68212bf39b1608070b4045de8f02391f
                              • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                              • Opcode Fuzzy Hash: f0c0cc8675646142fd89bdb58ed4d14c68212bf39b1608070b4045de8f02391f
                              • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                              APIs
                              • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExistsFilePath
                              • String ID: AppData$\Opera Software\Opera Stable\
                              • API String ID: 1174141254-1629609700
                              • Opcode ID: 966ad1c0b9db51bdb62c7854b74a1cb959393fa177e577b0bdfcd7534c47b356
                              • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                              • Opcode Fuzzy Hash: 966ad1c0b9db51bdb62c7854b74a1cb959393fa177e577b0bdfcd7534c47b356
                              • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: _free
                              • String ID: $G
                              • API String ID: 269201875-4251033865
                              • Opcode ID: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                              • Instruction ID: 5d396c1abc39b18bdc3e623667384c8b5cce6391ee106473ff554fc58991571d
                              • Opcode Fuzzy Hash: c3cbfa58486471b9b0b5450975d814376b4bfcef5d9edc52bbd6be3dc13577df
                              • Instruction Fuzzy Hash: 7CE0E532A0652041F675763B2D05A5B47C55FC2B3AF22033BF028861C1DFEC494A606E
                              APIs
                              • GetKeyState.USER32(00000011), ref: 0040B686
                                • Part of subcall function 0040A41B: GetForegroundWindow.USER32(?,?,00475100), ref: 0040A451
                                • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                • Part of subcall function 0040A41B: GetKeyboardState.USER32(?,?,00475100), ref: 0040A479
                                • Part of subcall function 0040A41B: ToUnicodeEx.USER32(00475154,00000000,?,?,00000010,00000000,00000000), ref: 0040A49C
                                • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                              • String ID: [AltL]$[AltR]
                              • API String ID: 2738857842-2658077756
                              • Opcode ID: 6a80a69b360d983d43fc671acba1cdd0286d48cffeca5b30a3a99feab9c297c2
                              • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                              • Opcode Fuzzy Hash: 6a80a69b360d983d43fc671acba1cdd0286d48cffeca5b30a3a99feab9c297c2
                              • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                              APIs
                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell
                              • String ID: !D@$open
                              • API String ID: 587946157-1586967515
                              • Opcode ID: eb4567e96d42521689c96e83ef1aa2a6a7df05ac31277aa5078135f6cb8d6bca
                              • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                              • Opcode Fuzzy Hash: eb4567e96d42521689c96e83ef1aa2a6a7df05ac31277aa5078135f6cb8d6bca
                              • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                              APIs
                              • GetKeyState.USER32(00000012), ref: 0040B6E0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: State
                              • String ID: [CtrlL]$[CtrlR]
                              • API String ID: 1649606143-2446555240
                              • Opcode ID: 68a21427a53fdb80c3da8a233085b44fd58d033cfb752835714686d39fb0ec3c
                              • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                              • Opcode Fuzzy Hash: 68a21427a53fdb80c3da8a233085b44fd58d033cfb752835714686d39fb0ec3c
                              • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                              APIs
                                • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                              • __Init_thread_footer.LIBCMT ref: 00410F64
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: Init_thread_footer__onexit
                              • String ID: <kG$@kG
                              • API String ID: 1881088180-1261746286
                              • Opcode ID: 3005333bcecaffa700c7528d759515cdbab9def11ce6217a52740adfeea124d5
                              • Instruction ID: b3c290aa7aaf28965b2d5d57398085964b0ab7c4475a0d5935719b6e6c356165
                              • Opcode Fuzzy Hash: 3005333bcecaffa700c7528d759515cdbab9def11ce6217a52740adfeea124d5
                              • Instruction Fuzzy Hash: 4BE0D8315049208AC510B75EE442AC53345DB0A324B21907BF414D72D2CBAE78C24E5D
                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752E8,00475300,?,pth_unenc), ref: 00413A6C
                              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: DeleteOpenValue
                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                              • API String ID: 2654517830-1051519024
                              • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                              • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                              • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                              APIs
                              • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                              • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ObjectProcessSingleTerminateWait
                              • String ID: pth_unenc
                              • API String ID: 1872346434-4028850238
                              • Opcode ID: d98377acd33bdda2349b7be151d0e491c89c80a6de05baeaae50e9a3ec635156
                              • Instruction ID: 4cc810616d40180dbd1e9271652f71629269b6e9fac0605c61d014a2f2010889
                              • Opcode Fuzzy Hash: d98377acd33bdda2349b7be151d0e491c89c80a6de05baeaae50e9a3ec635156
                              • Instruction Fuzzy Hash: B0D0C934189712EBD7220B70AE49B443A6CA705322F141360F429413F1C6A98894AA18
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: CommandLine
                              • String ID: 8({
                              • API String ID: 3253501508-1337158436
                              • Opcode ID: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                              • Instruction ID: 694146ce0b361bd31d1980ce40e18c0a636997d79f12e70286e675221abc8fda
                              • Opcode Fuzzy Hash: 21ebb353eb9a5e230f63c7dd18cef58b922ecce08ae36afe23ca5bbaac6cd083
                              • Instruction Fuzzy Hash: CBB04878800753CB97108F21AA0C0853FA0B30820238020B6940A92A21EB7885868A08
                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401BD9), ref: 00440D77
                              • GetLastError.KERNEL32 ref: 00440D85
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                              • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                              • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                              • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                              APIs
                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                              • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                              • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                              • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                              Memory Dump Source
                              • Source File: 00000000.00000002.4101120428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4101105554.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101154535.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000471000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101176453.0000000000474000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4101212053.0000000000478000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_17323410667d99229b9ce677d696d20502ddaab36e60066e7988d89e342c219aec646f.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorLastRead
                              • String ID:
                              • API String ID: 4100373531-0
                              • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                              • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                              • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                              • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99