Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
P87unxnF4t4DSrTt43.exe

Overview

General Information

Sample name:P87unxnF4t4DSrTt43.exe
Analysis ID:1592534
MD5:51bb5f38593e255c16ab2712757cda43
SHA1:458fbe81fed707852864c3bcc4997b27d6a65832
SHA256:1c80bf8e780ae58203e7f816c8fe04f66df434a3fbd981ba7c6e52e588622c03
Tags:exemalwareRemcosRATtrojanuser-Joker
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Injects a PE file into a foreign processes
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • P87unxnF4t4DSrTt43.exe (PID: 7644 cmdline: "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe" MD5: 51BB5F38593E255C16AB2712757CDA43)
    • powershell.exe (PID: 7832 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8140 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • P87unxnF4t4DSrTt43.exe (PID: 7848 cmdline: "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe" MD5: 51BB5F38593E255C16AB2712757CDA43)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["www.kposlifestyle.design:2404:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-OH1QS4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "edefdefffff", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\edefdefffff\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
            • 0x3f810:$a1: Remcos restarted by watchdog!
            • 0x3fd88:$a3: %02i:%02i:%02i:%03i
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x69308:$a1: Remcos restarted by watchdog!
                  • 0x69880:$a3: %02i:%02i:%02i:%03i
                  1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x63594:$str_a1: C:\Windows\System32\cmd.exe
                  • 0x63510:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x63510:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                  • 0x63a10:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x64010:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                  • 0x63604:$str_b2: Executing file:
                  • 0x6444c:$str_b3: GetDirectListeningPort
                  • 0x63e00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                  • 0x63f80:$str_b7: \update.vbs
                  • 0x6362c:$str_b9: Downloaded file:
                  • 0x63618:$str_b10: Downloading file:
                  • 0x636bc:$str_b12: Failed to upload file:
                  • 0x64414:$str_b13: StartForward
                  • 0x64434:$str_b14: StopForward
                  • 0x63ed8:$str_b15: fso.DeleteFile "
                  • 0x63e6c:$str_b16: On Error Resume Next
                  • 0x63f08:$str_b17: fso.DeleteFolder "
                  • 0x636ac:$str_b18: Uploaded file:
                  • 0x6366c:$str_b19: Unable to delete:
                  • 0x63ea0:$str_b20: while fso.FileExists("
                  • 0x63b49:$str_c0: [Firefox StoredLogins not found]
                  Click to see the 28 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", ParentImage: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe, ParentProcessId: 7644, ParentProcessName: P87unxnF4t4DSrTt43.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", ProcessId: 7832, ProcessName: powershell.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", ParentImage: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe, ParentProcessId: 7644, ParentProcessName: P87unxnF4t4DSrTt43.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", ProcessId: 7832, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", ParentImage: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe, ParentProcessId: 7644, ParentProcessName: P87unxnF4t4DSrTt43.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe", ProcessId: 7832, ProcessName: powershell.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: FF 9B 7F 6B 43 9F 59 B3 6D 05 DF 5D E3 CC B8 8D 5A BA ED D8 1F 9B 2C 2E 18 DF B3 B5 67 7F D3 5D 67 C0 27 9A 3A 4D 4F EA 78 FB 42 68 B3 F9 0E AF 37 3D 0B D2 6B CF 6C 3D F1 0A C7 A0 86 57 24 83 6C AF 18 CA 46 DC E7 03 98 2A 99 94 8F 08 51 EC D2 06 EB 42 D4 90 65 63 AE B3 14 34 0D AC DF EA 52 F6 7B 4C , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe, ProcessId: 7848, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-OH1QS4\exepath
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-16T09:09:11.893824+010020327761Malware Command and Control Activity Detected192.168.2.749704154.216.16.382404TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-16T09:09:12.574650+010020327771Malware Command and Control Activity Detected154.216.16.382404192.168.2.749704TCP
                  2025-01-16T09:11:13.522732+010020327771Malware Command and Control Activity Detected154.216.16.382404192.168.2.749704TCP
                  2025-01-16T09:13:13.617447+010020327771Malware Command and Control Activity Detected154.216.16.382404192.168.2.749704TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-16T09:09:14.094112+010028033043Unknown Traffic192.168.2.749711178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: P87unxnF4t4DSrTt43.exeAvira: detected
                  Source: www.kposlifestyle.designAvira URL Cloud: Label: malware
                  Source: 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["www.kposlifestyle.design:2404:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-OH1QS4", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "edefdefffff", "Keylog file max size": ""}
                  Source: P87unxnF4t4DSrTt43.exeVirustotal: Detection: 31%Perma Link
                  Source: P87unxnF4t4DSrTt43.exeReversingLabs: Detection: 31%
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: P87unxnF4t4DSrTt43.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00432B45 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,6_2_00432B45
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_15f3a43b-4

                  Exploits

                  barindex
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTR

                  Privilege Escalation

                  barindex
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00406764 _wcslen,CoGetObject,6_2_00406764
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: sPiG.pdbSHA256xsLF source: P87unxnF4t4DSrTt43.exe
                  Source: Binary string: sPiG.pdb source: P87unxnF4t4DSrTt43.exe
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,6_2_0040B335
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,6_2_0040B53A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,6_2_0041B63A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0044D7F9 FindFirstFileExA,6_2_0044D7F9
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,6_2_004089A9
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00406AC2 FindFirstFileW,FindNextFileW,6_2_00406AC2
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,6_2_00407A8C
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,6_2_00408DA7
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW,6_2_00418E5F
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,6_2_00406F06

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:49704 -> 154.216.16.38:2404
                  Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 154.216.16.38:2404 -> 192.168.2.7:49704
                  Source: Malware configuration extractorURLs: www.kposlifestyle.design
                  Source: global trafficTCP traffic: 192.168.2.7:49704 -> 154.216.16.38:2404
                  Source: global trafficTCP traffic: 192.168.2.7:53968 -> 162.159.36.2:53
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: SKHT-ASShenzhenKatherineHengTechnologyInformationCo SKHT-ASShenzhenKatherineHengTechnologyInformationCo
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.7:49711 -> 178.237.33.50:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040455B WaitForSingleObject,SetEvent,recv,6_2_0040455B
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: global trafficDNS traffic detected: DNS query: www.kposlifestyle.design
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780695534.0000000001434000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, P87unxnF4t4DSrTt43.exe, 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341026272.00000000032F8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000006_2_004099E4
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,6_2_00415B5E
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,6_2_00415B5E
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00415B5E OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,6_2_00415B5E
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,6_2_00409B10
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041BD82 SystemParametersInfoW,6_2_0041BD82

                  System Summary

                  barindex
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00415A51 ExitWindowsEx,LoadLibraryA,GetProcAddress,6_2_00415A51
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_0184DC8C1_2_0184DC8C
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03062E681_2_03062E68
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_030663101_2_03066310
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_030663201_2_03066320
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_0306C7081_2_0306C708
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_030684501_2_03068450
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03067B0F1_2_03067B0F
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03067B201_2_03067B20
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03065AB01_2_03065AB0
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03062E591_2_03062E59
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03065ED81_2_03065ED8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_03065EE81_2_03065EE8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_05776F481_2_05776F48
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_057702D81_2_057702D8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_057702C81_2_057702C8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_05776F381_2_05776F38
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043D04B6_2_0043D04B
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0042707E6_2_0042707E
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041301D6_2_0041301D
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004410306_2_00441030
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004531106_2_00453110
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004271B86_2_004271B8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041D27C6_2_0041D27C
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004522E26_2_004522E2
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043D2A86_2_0043D2A8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004373606_2_00437360
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004363BA6_2_004363BA
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0042645F6_2_0042645F
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004315826_2_00431582
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043672C6_2_0043672C
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041E7EA6_2_0041E7EA
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0044C9496_2_0044C949
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004269D66_2_004269D6
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004369D66_2_004369D6
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043CBED6_2_0043CBED
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00432C546_2_00432C54
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00436C9D6_2_00436C9D
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043CE1C6_2_0043CE1C
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00436F586_2_00436F58
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00434F326_2_00434F32
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: String function: 00401F66 appears 50 times
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: String function: 004020E7 appears 40 times
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: String function: 00433AB0 appears 41 times
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: String function: 004341C0 appears 55 times
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1338994663.000000000161E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1352629348.000000000B4C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000000.1321081732.0000000000E12000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesPiG.exe4 vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1348548828.0000000005D20000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1349492914.0000000008CB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCaptive.dll" vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exeBinary or memory string: OriginalFilenamesPiG.exe4 vs P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@7/8@3/2
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00416C9D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,6_2_00416C9D
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040E2F1 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,6_2_0040E2F1
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041A84A FindResourceA,LoadResource,LockResource,SizeofResource,6_2_0041A84A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00419DBA OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,6_2_00419DBA
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\P87unxnF4t4DSrTt43.exe.logJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-OH1QS4
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7840:120:WilError_03
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wuc2hjpp.f05.ps1Jump to behavior
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: P87unxnF4t4DSrTt43.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: P87unxnF4t4DSrTt43.exeVirustotal: Detection: 31%
                  Source: P87unxnF4t4DSrTt43.exeReversingLabs: Detection: 31%
                  Source: unknownProcess created: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: P87unxnF4t4DSrTt43.exeStatic file information: File size 1056768 > 1048576
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x101600
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: sPiG.pdbSHA256xsLF source: P87unxnF4t4DSrTt43.exe
                  Source: Binary string: sPiG.pdb source: P87unxnF4t4DSrTt43.exe
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: 0xA23B2A12 [Sat Apr 1 03:46:26 2056 UTC]
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,6_2_0041BEEE
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 1_2_0184EEC2 push esp; iretd 1_2_0184EEC9
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004560BF push ecx; ret 6_2_004560D2
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00434206 push ecx; ret 6_2_00434219
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0045E669 push ecx; ret 6_2_0045E67B
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0045C9DD push esi; ret 6_2_0045C9E6
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004569F0 push eax; ret 6_2_00456A0E
                  Source: P87unxnF4t4DSrTt43.exeStatic PE information: section name: .text entropy: 7.766809579204765
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00406128 ShellExecuteW,URLDownloadToFileW,6_2_00406128
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00419DBA OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,6_2_00419DBA

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,6_2_0041BEEE
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040E627 Sleep,ExitProcess,6_2_0040E627
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: 1840000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: 32B0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: 3060000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: 8E90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: 7640000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: 9E90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: AE90000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: B580000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: C580000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: D580000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,6_2_00419AB8
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5908Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3717Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeWindow / User API: threadDelayed 936Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeWindow / User API: threadDelayed 8572Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeWindow / User API: foregroundWindowGot 1769Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe TID: 7664Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8000Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe TID: 7908Thread sleep time: -116000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe TID: 7912Thread sleep time: -2808000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe TID: 7912Thread sleep time: -25716000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,6_2_0040B335
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,6_2_0040B53A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041B63A FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,6_2_0041B63A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0044D7F9 FindFirstFileExA,6_2_0044D7F9
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,6_2_004089A9
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00406AC2 FindFirstFileW,FindNextFileW,6_2_00406AC2
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,6_2_00407A8C
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,6_2_00408DA7
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00418E5F FindFirstFileW,FindNextFileW,FindNextFileW,6_2_00418E5F
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,6_2_00406F06
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`)A
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780695534.000000000143B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeAPI call chain: ExitProcess graph end nodegraph_6-49208
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043A86D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0043A86D
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041BEEE LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,6_2_0041BEEE
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00442764 mov eax, dword ptr fs:[00000030h]6_2_00442764
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0044EB3E GetProcessHeap,6_2_0044EB3E
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00434378 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_00434378
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0043A86D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0043A86D
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00433D4F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00433D4F
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00433EE2 SetUnhandledExceptionFilter,6_2_00433EE2
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMemory written: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe6_2_0041100E
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041894A mouse_event,6_2_0041894A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeProcess created: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"Jump to behavior
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\264
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerer
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager^F
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerSF
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManageruF
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\f1
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.0000000001404000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bProgram ManagerZ^
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerS4\er
                  Source: P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, logs.dat.6.drBinary or memory string: [Program Manager]
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00434015 cpuid 6_2_00434015
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetLocaleInfoA,6_2_0040E751
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_0045107A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetLocaleInfoW,6_2_004512CA
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: EnumSystemLocalesW,6_2_004472BE
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_004513F3
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetLocaleInfoW,6_2_004514FA
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_004515C7
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: GetLocaleInfoW,6_2_004477A7
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,6_2_00450C8F
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: EnumSystemLocalesW,6_2_00450F52
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: EnumSystemLocalesW,6_2_00450F07
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: EnumSystemLocalesW,6_2_00450FED
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeQueries volume information: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_00404915 GetLocalTime,CreateEventA,CreateThread,6_2_00404915
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0041A9AD GetComputerNameExW,GetUserNameW,6_2_0041A9AD
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: 6_2_0044804A _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,6_2_0044804A
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data6_2_0040B21B
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\6_2_0040B335
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: \key3.db6_2_0040B335

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-OH1QS4Jump to behavior
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 6.2.P87unxnF4t4DSrTt43.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4fa76d8.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4e2ea98.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.P87unxnF4t4DSrTt43.exe.4eeb0b8.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7644, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: P87unxnF4t4DSrTt43.exe PID: 7848, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\edefdefffff\logs.dat, type: DROPPED
                  Source: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exeCode function: cmd.exe6_2_00405042
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  12
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Bypass User Account Control
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol211
                  Input Capture
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  Logon Script (Windows)1
                  Access Token Manipulation
                  3
                  Obfuscated Files or Information
                  2
                  Credentials In Files
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares3
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                  Windows Service
                  2
                  Software Packing
                  NTDS3
                  File and Directory Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                  Process Injection
                  1
                  Timestomp
                  LSA Secrets33
                  System Information Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials21
                  Security Software Discovery
                  VNCGUI Input Capture12
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Bypass User Account Control
                  DCSync31
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Masquerading
                  Proc Filesystem3
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt31
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                  Access Token Manipulation
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd122
                  Process Injection
                  Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  P87unxnF4t4DSrTt43.exe32%VirustotalBrowse
                  P87unxnF4t4DSrTt43.exe32%ReversingLabs
                  P87unxnF4t4DSrTt43.exe100%AviraHEUR/AGEN.1309499
                  P87unxnF4t4DSrTt43.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  www.kposlifestyle.design100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  www.kposlifestyle.design
                  154.216.16.38
                  truetrue
                    unknown
                    geoplugin.net
                    178.237.33.50
                    truefalse
                      high
                      171.39.242.20.in-addr.arpa
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://geoplugin.net/json.gpfalse
                          high
                          www.kposlifestyle.designtrue
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://geoplugin.net/P87unxnF4t4DSrTt43.exe, 00000006.00000002.3780695534.0000000001434000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://geoplugin.net/json.gp/CP87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, P87unxnF4t4DSrTt43.exe, 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, P87unxnF4t4DSrTt43.exe, 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameP87unxnF4t4DSrTt43.exe, 00000001.00000002.1341026272.00000000032F8000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                178.237.33.50
                                geoplugin.netNetherlands
                                8455ATOM86-ASATOM86NLfalse
                                154.216.16.38
                                www.kposlifestyle.designSeychelles
                                135357SKHT-ASShenzhenKatherineHengTechnologyInformationCotrue
                                Joe Sandbox version:42.0.0 Malachite
                                Analysis ID:1592534
                                Start date and time:2025-01-16 09:08:08 +01:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 7m 56s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                Number of analysed new started processes analysed:14
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:P87unxnF4t4DSrTt43.exe
                                Detection:MAL
                                Classification:mal100.rans.troj.spyw.expl.evad.winEXE@7/8@3/2
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 84
                                • Number of non-executed functions: 184
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 184.28.90.27, 4.175.87.197, 20.242.39.171, 4.245.163.56
                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtCreateKey calls found.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                03:09:10API Interceptor7431451x Sleep call for process: P87unxnF4t4DSrTt43.exe modified
                                03:09:11API Interceptor15x Sleep call for process: powershell.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                178.237.33.501736928426c18fddec09a2865189863f874127ef0886c6a264008603d3a139c5bad971edfc789.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • geoplugin.net/json.gp
                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • geoplugin.net/json.gp
                                preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                • geoplugin.net/json.gp
                                verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                • geoplugin.net/json.gp
                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                documents.exeGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                c2.htaGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                c2.htaGet hashmaliciousRemcosBrowse
                                • geoplugin.net/json.gp
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                www.kposlifestyle.designplugmancrypted.exeGet hashmaliciousRemcosBrowse
                                • 154.216.16.38
                                geoplugin.net1736928426c18fddec09a2865189863f874127ef0886c6a264008603d3a139c5bad971edfc789.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 178.237.33.50
                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 178.237.33.50
                                preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                • 178.237.33.50
                                verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                • 178.237.33.50
                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                documents.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                c2.htaGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                c2.htaGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SKHT-ASShenzhenKatherineHengTechnologyInformationConew.batGet hashmaliciousUnknownBrowse
                                • 154.216.17.175
                                https://caringforyousupport.com.au/Receipt536354.phpGet hashmaliciousWinSearchAbuseBrowse
                                • 154.216.17.175
                                https://9817157365.com/Get hashmaliciousUnknownBrowse
                                • 160.202.168.107
                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                • 154.216.16.38
                                1E3Vcm2yrA.exeGet hashmaliciousRHADAMANTHYSBrowse
                                • 154.216.18.169
                                icivfhp7cR.exeGet hashmaliciousGhostRatBrowse
                                • 45.207.211.42
                                6.elfGet hashmaliciousUnknownBrowse
                                • 154.211.34.18
                                wind.mpsl.elfGet hashmaliciousMiraiBrowse
                                • 154.216.16.103
                                wind.arm.elfGet hashmaliciousMiraiBrowse
                                • 154.216.16.103
                                wind.x86.elfGet hashmaliciousMiraiBrowse
                                • 154.216.16.103
                                ATOM86-ASATOM86NL1736928426c18fddec09a2865189863f874127ef0886c6a264008603d3a139c5bad971edfc789.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                LrBF2Z930N.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 178.237.33.50
                                2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 178.237.33.50
                                preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                • 178.237.33.50
                                verynicegirlwalkingarounftheworldmuuuah.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                                • 178.237.33.50
                                plugmancrypted.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                documents.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                17366735083ba4993c0ae9322c32aacf9286de757a918f634b522467c19ad3da2352651d39438.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                c.htaGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                c2.htaGet hashmaliciousRemcosBrowse
                                • 178.237.33.50
                                No context
                                No context
                                Process:C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):144
                                Entropy (8bit):3.3683413243328855
                                Encrypted:false
                                SSDEEP:3:rglsIlfVl1liqlDl5JWRal2Jl+7R0DAlBG45klovDl6v:Mls4tliql55YcIeeDAlOWAv
                                MD5:3E54DBDF72CF465A11387B15F64743C5
                                SHA1:102C4459595FD05992F0226C6392A8ABB2686002
                                SHA-256:809E601A1CE0E0B11EC92B803EF42FAC1947A030FF1184BCE6C1EBBD6257074B
                                SHA-512:F58EB76C3147599346B93D53418AB87E46A8BBFE42B359BFC86104A770A77CD8C9797ABF6663910A9CAB7E16ABDB2A724B9A168558152836DCB570B14B4AC7A0
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\edefdefffff\logs.dat, Author: Joe Security
                                Reputation:low
                                Preview:....[.2.0.2.5./.0.1./.1.6. .0.3.:.0.9.:.1.0. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                Process:C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.34331486778365
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                Process:C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                File Type:JSON data
                                Category:dropped
                                Size (bytes):963
                                Entropy (8bit):5.018421233492188
                                Encrypted:false
                                SSDEEP:12:tkluWJmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkv:qlupdVauKyGX85jvXhNlT3/7XcV7Wro
                                MD5:EB2FF94DBB57A448547893913F07269C
                                SHA1:DF7B8498413BA06578D4743941ED5664A88945FC
                                SHA-256:0FAD6CBFD4862A474081C36DF3E5E29F45A5EAC652C02BEF9E3637A7EB388B96
                                SHA-512:F2D29C38E688792AC270E45DC9213ED1C58ACEE67B7C18F4873296A9FC3D1B2F79B317712EFBCB1CDC9A637070C87605DE39387B5246A7B9644B15EF25494374
                                Malicious:false
                                Reputation:low
                                Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7126",. "geoplugin_longitude":"-74.0066",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2232
                                Entropy (8bit):5.3810236212315665
                                Encrypted:false
                                SSDEEP:48:lylWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMugeC/ZPUyus:lGLHxv2IfLZ2KRH6Oug8s
                                MD5:46CFAD7E103735ABA6646E3E9F6012AF
                                SHA1:F864D5F42D478A79AF32EAE14B87265DE193A851
                                SHA-256:55D9A9F40CF5657C548085C6C2472DF452CF3B1A75515C52F59D8853C5F39E74
                                SHA-512:8AE818C136BC9AD5A375BDF9B7688C900C8CBE69A17660D428618259E680F338557E5DFF9897E1414E95E2AB1F5B9792965C20FAB7320648FB0B430C10F81A48
                                Malicious:false
                                Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.7628064558005425
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                • DOS Executable Generic (2002/1) 0.01%
                                File name:P87unxnF4t4DSrTt43.exe
                                File size:1'056'768 bytes
                                MD5:51bb5f38593e255c16ab2712757cda43
                                SHA1:458fbe81fed707852864c3bcc4997b27d6a65832
                                SHA256:1c80bf8e780ae58203e7f816c8fe04f66df434a3fbd981ba7c6e52e588622c03
                                SHA512:80d2f4464d5f036000318ef6ba43b23c8e5576c67989b0097adbf13545b790df1340937d1f7f67d0d8630b2f80c8b85e3286032554868424d2bb5612fda6dcf9
                                SSDEEP:12288:O8iWXV7O7jJlohi9cptOybLZG6OHGw2/EvK6hxshTAaZpAWLq8uFTF+cMSIsYSv/:FO7jX+pRblGp1vKMuhtTk0sYyKvwTm
                                TLSH:F625E0D03B3A7711DDA8B670853AEDB863642D78B000B9E76DDD2B8772DD2029A1CF45
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....*;...............0..............4... ...@....@.. ....................................@................................
                                Icon Hash:00928e8e8686b000
                                Entrypoint:0x5034d6
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0xA23B2A12 [Sat Apr 1 03:46:26 2056 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                lodsd
                                fiadd word ptr [eax]
                                add bh, ch
                                mov esi, CAFE0000h
                                add byte ptr [eax], al
                                mov esi, 000000BAh
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1034820x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1040000x59c.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1060000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x10192c0x70.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x1014ec0x1016009588b383f3856961598132975491c318False0.8985001062408936data7.766809579204765IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0x1040000x59c0x6009984a5aa55d43e1c3a4ee986ab63fcccFalse0.4186197916666667data4.048277443839362IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1060000xc0x200933092226d15491ad21b816062fd25fcFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_VERSION0x1040900x30cdata0.4371794871794872
                                RT_MANIFEST0x1043ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2025-01-16T09:09:11.893824+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.749704154.216.16.382404TCP
                                2025-01-16T09:09:12.574650+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1154.216.16.382404192.168.2.749704TCP
                                2025-01-16T09:09:14.094112+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.749711178.237.33.5080TCP
                                2025-01-16T09:11:13.522732+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1154.216.16.382404192.168.2.749704TCP
                                2025-01-16T09:13:13.617447+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1154.216.16.382404192.168.2.749704TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 16, 2025 09:09:11.879291058 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:11.885814905 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:11.885926962 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:11.893824100 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:11.900541067 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:12.574650049 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:12.577589035 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:12.582659006 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:12.731219053 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:12.779105902 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:13.135574102 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:13.144855022 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:13.149591923 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:13.464845896 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:09:13.471061945 CET8049711178.237.33.50192.168.2.7
                                Jan 16, 2025 09:09:13.471189976 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:09:13.471362114 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:09:13.477149963 CET8049711178.237.33.50192.168.2.7
                                Jan 16, 2025 09:09:14.093965054 CET8049711178.237.33.50192.168.2.7
                                Jan 16, 2025 09:09:14.094111919 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:09:14.103810072 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:14.108633995 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:15.090734959 CET8049711178.237.33.50192.168.2.7
                                Jan 16, 2025 09:09:15.090795994 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:09:42.631088018 CET5396853192.168.2.7162.159.36.2
                                Jan 16, 2025 09:09:42.635951042 CET5353968162.159.36.2192.168.2.7
                                Jan 16, 2025 09:09:42.636046886 CET5396853192.168.2.7162.159.36.2
                                Jan 16, 2025 09:09:42.640948057 CET5353968162.159.36.2192.168.2.7
                                Jan 16, 2025 09:09:43.101061106 CET5396853192.168.2.7162.159.36.2
                                Jan 16, 2025 09:09:43.106414080 CET5353968162.159.36.2192.168.2.7
                                Jan 16, 2025 09:09:43.106519938 CET5396853192.168.2.7162.159.36.2
                                Jan 16, 2025 09:09:43.235460997 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:09:43.238955021 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:09:43.243805885 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:10:13.367706060 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:10:13.369081020 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:10:13.373910904 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:10:43.483475924 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:10:43.484941006 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:10:43.489828110 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:11:03.421741962 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:03.826942921 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:04.468012094 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:05.827761889 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:08.297375917 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:13.123910904 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:13.522732019 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:11:13.527832985 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:11:13.532800913 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:11:22.827121973 CET4971180192.168.2.7178.237.33.50
                                Jan 16, 2025 09:11:43.551197052 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:11:43.552529097 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:11:43.557451963 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:12:13.582009077 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:12:13.584347963 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:12:13.589211941 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:12:43.611133099 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:12:43.612276077 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:12:43.617166042 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.266017914 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.267648935 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.272551060 CET240454065154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.272625923 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.272675037 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.277395010 CET240454065154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.307075024 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.424154997 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.428843975 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.434407949 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.434493065 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.434582949 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.440412045 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.509330034 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.514915943 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.514931917 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.514940977 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.514950037 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.514971972 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.514981985 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.514991045 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.515001059 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.515005112 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.515006065 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.515017986 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.515038013 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:12.519900084 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.519912958 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.519932032 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.519941092 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.519952059 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.562516928 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:12.603192091 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:13.281445980 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:13.286389112 CET240454065154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.490134954 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.524090052 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:13.528975964 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529028893 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529037952 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529052973 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529062033 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529064894 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529072046 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529104948 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529114008 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529124022 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529145002 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529225111 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529233932 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529237032 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529244900 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529256105 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529270887 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529279947 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.529720068 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.617446899 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:13.621645927 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:13.626545906 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.297409058 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:14.302217007 CET240454065154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.501024008 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.554748058 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:14.559659004 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559679985 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559751987 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559763908 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559808969 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559820890 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559858084 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559870005 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559912920 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559923887 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559962988 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.559974909 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560009003 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560019970 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560064077 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560075998 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560112000 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560122967 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560153008 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560164928 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560245037 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:14.560256958 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.312736988 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:15.317548990 CET240454065154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.516422987 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.554541111 CET540662404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:15.559403896 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559427023 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559505939 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559542894 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559600115 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559612036 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559643030 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559654951 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559716940 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559729099 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559757948 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559770107 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559806108 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559817076 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559861898 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559874058 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559901953 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559914112 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559979916 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.559994936 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.560020924 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:15.560033083 CET240454066154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:16.626673937 CET240449704154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:16.644028902 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:16.648885965 CET240454065154.216.16.38192.168.2.7
                                Jan 16, 2025 09:13:16.705784082 CET497042404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:16.705919981 CET540652404192.168.2.7154.216.16.38
                                Jan 16, 2025 09:13:16.706548929 CET540662404192.168.2.7154.216.16.38
                                TimestampSource PortDest PortSource IPDest IP
                                Jan 16, 2025 09:09:11.833790064 CET6114553192.168.2.71.1.1.1
                                Jan 16, 2025 09:09:11.844716072 CET53611451.1.1.1192.168.2.7
                                Jan 16, 2025 09:09:13.453501940 CET5800453192.168.2.71.1.1.1
                                Jan 16, 2025 09:09:13.461399078 CET53580041.1.1.1192.168.2.7
                                Jan 16, 2025 09:09:42.630348921 CET5355492162.159.36.2192.168.2.7
                                Jan 16, 2025 09:09:43.115272045 CET6515253192.168.2.71.1.1.1
                                Jan 16, 2025 09:09:43.122430086 CET53651521.1.1.1192.168.2.7
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jan 16, 2025 09:09:11.833790064 CET192.168.2.71.1.1.10x917bStandard query (0)www.kposlifestyle.designA (IP address)IN (0x0001)false
                                Jan 16, 2025 09:09:13.453501940 CET192.168.2.71.1.1.10xf208Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                Jan 16, 2025 09:09:43.115272045 CET192.168.2.71.1.1.10xb12fStandard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jan 16, 2025 09:09:11.844716072 CET1.1.1.1192.168.2.70x917bNo error (0)www.kposlifestyle.design154.216.16.38A (IP address)IN (0x0001)false
                                Jan 16, 2025 09:09:13.461399078 CET1.1.1.1192.168.2.70xf208No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                Jan 16, 2025 09:09:43.122430086 CET1.1.1.1192.168.2.70xb12fName error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                • geoplugin.net
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.2.749711178.237.33.50807848C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                TimestampBytes transferredDirectionData
                                Jan 16, 2025 09:09:13.471362114 CET71OUTGET /json.gp HTTP/1.1
                                Host: geoplugin.net
                                Cache-Control: no-cache
                                Jan 16, 2025 09:09:14.093965054 CET1171INHTTP/1.1 200 OK
                                date: Thu, 16 Jan 2025 08:09:14 GMT
                                server: Apache
                                content-length: 963
                                content-type: application/json; charset=utf-8
                                cache-control: public, max-age=300
                                access-control-allow-origin: *
                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7126", "geoplugin_longitude":"-74.0066", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:1
                                Start time:03:09:09
                                Start date:16/01/2025
                                Path:C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                                Imagebase:0xe10000
                                File size:1'056'768 bytes
                                MD5 hash:51BB5F38593E255C16AB2712757CDA43
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.1341710478.00000000042B9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000001.00000002.1341710478.0000000004B23000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                Reputation:low
                                Has exited:true

                                Target ID:4
                                Start time:03:09:10
                                Start date:16/01/2025
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                                Imagebase:0x300000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:03:09:10
                                Start date:16/01/2025
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff75da10000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:03:09:10
                                Start date:16/01/2025
                                Path:C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe"
                                Imagebase:0xc80000
                                File size:1'056'768 bytes
                                MD5 hash:51BB5F38593E255C16AB2712757CDA43
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.3780449094.00000000013C7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                Reputation:low
                                Has exited:false

                                Target ID:8
                                Start time:03:09:12
                                Start date:16/01/2025
                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                Imagebase:0x7ff7fb730000
                                File size:496'640 bytes
                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                Has elevated privileges:true
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:11%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:1.9%
                                  Total number of Nodes:322
                                  Total number of Limit Nodes:21
                                  execution_graph 38313 15fd01c 38314 15fd034 38313->38314 38315 15fd08e 38314->38315 38320 5771d37 38314->38320 38325 5771d48 38314->38325 38330 5772aa8 38314->38330 38336 5772ab8 38314->38336 38321 5771d48 38320->38321 38323 5772ab8 3 API calls 38321->38323 38324 5772aa8 3 API calls 38321->38324 38322 5771d8f 38322->38315 38323->38322 38324->38322 38326 5771d6e 38325->38326 38328 5772ab8 3 API calls 38326->38328 38329 5772aa8 3 API calls 38326->38329 38327 5771d8f 38327->38315 38328->38327 38329->38327 38331 5772ab8 38330->38331 38332 5772b17 38331->38332 38342 5772c31 38331->38342 38348 5772d0c 38331->38348 38354 5772c40 38331->38354 38337 5772abd 38336->38337 38338 5772b17 38337->38338 38339 5772c31 3 API calls 38337->38339 38340 5772c40 3 API calls 38337->38340 38341 5772d0c 3 API calls 38337->38341 38339->38338 38340->38338 38341->38338 38343 5772c2b 38342->38343 38345 5772c3a 38342->38345 38343->38332 38344 5772ce0 38344->38332 38359 5772ce7 38345->38359 38364 5772cf8 38345->38364 38349 5772d1a 38348->38349 38350 5772cca 38348->38350 38352 5772ce7 3 API calls 38350->38352 38353 5772cf8 3 API calls 38350->38353 38351 5772ce0 38351->38332 38352->38351 38353->38351 38356 5772c54 38354->38356 38355 5772ce0 38355->38332 38357 5772ce7 3 API calls 38356->38357 38358 5772cf8 3 API calls 38356->38358 38357->38355 38358->38355 38360 5772cf8 38359->38360 38361 5772d09 38360->38361 38368 577410e 38360->38368 38379 577413b 38360->38379 38361->38344 38365 5772d09 38364->38365 38366 577410e 3 API calls 38364->38366 38367 577413b 3 API calls 38364->38367 38365->38344 38366->38365 38367->38365 38369 5774176 38368->38369 38370 577411a 38368->38370 38371 577413f 38369->38371 38372 5774178 38369->38372 38370->38361 38373 577414a 38371->38373 38377 577410e 2 API calls 38371->38377 38384 5774160 38371->38384 38388 577415b 38371->38388 38374 57741fa CallWindowProcW 38372->38374 38375 57741a9 38372->38375 38373->38361 38374->38375 38375->38361 38377->38373 38381 5774160 CallWindowProcW 38379->38381 38382 577410e 3 API calls 38379->38382 38383 577415b CallWindowProcW 38379->38383 38380 577414a 38380->38361 38381->38380 38382->38380 38383->38380 38385 57741a2 38384->38385 38386 57741a9 38384->38386 38385->38386 38387 57741fa CallWindowProcW 38385->38387 38386->38373 38387->38386 38389 5774160 38388->38389 38390 57741fa CallWindowProcW 38389->38390 38391 57741a9 38389->38391 38390->38391 38391->38373 38392 184b5c0 38393 184b602 38392->38393 38394 184b608 GetModuleHandleW 38392->38394 38393->38394 38395 184b635 38394->38395 38396 184d5c0 38397 184d5c5 DuplicateHandle 38396->38397 38398 184d656 38397->38398 38671 306b2b0 38674 306b2b5 38671->38674 38672 306b43b 38674->38672 38675 3067210 38674->38675 38676 306b530 PostMessageW 38675->38676 38677 306b59c 38676->38677 38677->38674 38399 30691a1 38401 30690e5 38399->38401 38400 30692e4 38401->38400 38405 306a011 38401->38405 38428 3069fc8 38401->38428 38450 3069fb8 38401->38450 38406 3069fe6 38405->38406 38408 306a01e 38405->38408 38407 3069f78 38406->38407 38472 306a780 38406->38472 38477 306a659 38406->38477 38484 306a599 38406->38484 38489 306ab1f 38406->38489 38494 306a5b1 38406->38494 38501 306a7b1 38406->38501 38508 306ab32 38406->38508 38513 306aad2 38406->38513 38517 306a674 38406->38517 38527 306a5f4 38406->38527 38533 306ab77 38406->38533 38538 306a8c8 38406->38538 38545 306aa88 38406->38545 38552 306a94b 38406->38552 38559 306a40b 38406->38559 38564 306a4ec 38406->38564 38569 306a80c 38406->38569 38574 306a48f 38406->38574 38579 306a560 38406->38579 38407->38400 38408->38400 38429 3069fe2 38428->38429 38430 306a006 38429->38430 38431 306a780 2 API calls 38429->38431 38432 306a560 4 API calls 38429->38432 38433 306a48f 2 API calls 38429->38433 38434 306a80c 2 API calls 38429->38434 38435 306a4ec 2 API calls 38429->38435 38436 306a40b 2 API calls 38429->38436 38437 306a94b 4 API calls 38429->38437 38438 306aa88 4 API calls 38429->38438 38439 306a8c8 4 API calls 38429->38439 38440 306ab77 2 API calls 38429->38440 38441 306a5f4 2 API calls 38429->38441 38442 306a674 4 API calls 38429->38442 38443 306aad2 2 API calls 38429->38443 38444 306ab32 2 API calls 38429->38444 38445 306a7b1 4 API calls 38429->38445 38446 306a5b1 4 API calls 38429->38446 38447 306ab1f 2 API calls 38429->38447 38448 306a599 2 API calls 38429->38448 38449 306a659 4 API calls 38429->38449 38430->38400 38431->38430 38432->38430 38433->38430 38434->38430 38435->38430 38436->38430 38437->38430 38438->38430 38439->38430 38440->38430 38441->38430 38442->38430 38443->38430 38444->38430 38445->38430 38446->38430 38447->38430 38448->38430 38449->38430 38451 3069fe2 38450->38451 38452 306a006 38451->38452 38453 306a780 2 API calls 38451->38453 38454 306a560 4 API calls 38451->38454 38455 306a48f 2 API calls 38451->38455 38456 306a80c 2 API calls 38451->38456 38457 306a4ec 2 API calls 38451->38457 38458 306a40b 2 API calls 38451->38458 38459 306a94b 4 API calls 38451->38459 38460 306aa88 4 API calls 38451->38460 38461 306a8c8 4 API calls 38451->38461 38462 306ab77 2 API calls 38451->38462 38463 306a5f4 2 API calls 38451->38463 38464 306a674 4 API calls 38451->38464 38465 306aad2 2 API calls 38451->38465 38466 306ab32 2 API calls 38451->38466 38467 306a7b1 4 API calls 38451->38467 38468 306a5b1 4 API calls 38451->38468 38469 306ab1f 2 API calls 38451->38469 38470 306a599 2 API calls 38451->38470 38471 306a659 4 API calls 38451->38471 38452->38400 38453->38452 38454->38452 38455->38452 38456->38452 38457->38452 38458->38452 38459->38452 38460->38452 38461->38452 38462->38452 38463->38452 38464->38452 38465->38452 38466->38452 38467->38452 38468->38452 38469->38452 38470->38452 38471->38452 38473 306a9a2 38472->38473 38474 306a5f8 38473->38474 38586 3068883 38473->38586 38590 3068888 38473->38590 38478 306a56c 38477->38478 38479 306acd5 38478->38479 38594 30683a0 38478->38594 38598 3068398 38478->38598 38602 3068b10 38478->38602 38606 3068b08 38478->38606 38479->38407 38485 306ab89 38484->38485 38610 3068a20 38485->38610 38614 3068a1b 38485->38614 38486 306abad 38490 306a823 38489->38490 38491 306a844 38489->38491 38492 3068a20 WriteProcessMemory 38490->38492 38493 3068a1b WriteProcessMemory 38490->38493 38491->38407 38492->38491 38493->38491 38496 306a56c 38494->38496 38495 306acd5 38495->38407 38496->38495 38497 30683a0 ResumeThread 38496->38497 38498 3068398 ResumeThread 38496->38498 38499 3068b10 ReadProcessMemory 38496->38499 38500 3068b08 ReadProcessMemory 38496->38500 38497->38496 38498->38496 38499->38496 38500->38496 38502 306a56c 38501->38502 38502->38501 38503 306acd5 38502->38503 38504 3068b10 ReadProcessMemory 38502->38504 38505 3068b08 ReadProcessMemory 38502->38505 38506 30683a0 ResumeThread 38502->38506 38507 3068398 ResumeThread 38502->38507 38503->38407 38504->38502 38505->38502 38506->38502 38507->38502 38509 306ab44 38508->38509 38618 306895b 38509->38618 38622 3068960 38509->38622 38510 306ae9c 38515 3068a20 WriteProcessMemory 38513->38515 38516 3068a1b WriteProcessMemory 38513->38516 38514 306ab00 38515->38514 38516->38514 38518 306a7b8 38517->38518 38519 306a56c 38518->38519 38525 3068b10 ReadProcessMemory 38518->38525 38526 3068b08 ReadProcessMemory 38518->38526 38520 306acd5 38519->38520 38521 3068b10 ReadProcessMemory 38519->38521 38522 3068b08 ReadProcessMemory 38519->38522 38523 30683a0 ResumeThread 38519->38523 38524 3068398 ResumeThread 38519->38524 38520->38407 38521->38519 38522->38519 38523->38519 38524->38519 38525->38519 38526->38519 38528 306a589 38527->38528 38529 306a5f9 38527->38529 38531 3068a20 WriteProcessMemory 38528->38531 38532 3068a1b WriteProcessMemory 38528->38532 38530 306abad 38531->38530 38532->38530 38534 306ae44 38533->38534 38536 3068883 Wow64SetThreadContext 38534->38536 38537 3068888 Wow64SetThreadContext 38534->38537 38535 306ae5f 38536->38535 38537->38535 38540 306a56c 38538->38540 38539 306acd5 38539->38407 38540->38539 38541 30683a0 ResumeThread 38540->38541 38542 3068398 ResumeThread 38540->38542 38543 3068b10 ReadProcessMemory 38540->38543 38544 3068b08 ReadProcessMemory 38540->38544 38541->38540 38542->38540 38543->38540 38544->38540 38546 306a56c 38545->38546 38547 306acd5 38546->38547 38548 3068b10 ReadProcessMemory 38546->38548 38549 3068b08 ReadProcessMemory 38546->38549 38550 30683a0 ResumeThread 38546->38550 38551 3068398 ResumeThread 38546->38551 38547->38407 38548->38546 38549->38546 38550->38546 38551->38546 38553 306a56c 38552->38553 38554 306acd5 38553->38554 38555 30683a0 ResumeThread 38553->38555 38556 3068398 ResumeThread 38553->38556 38557 3068b10 ReadProcessMemory 38553->38557 38558 3068b08 ReadProcessMemory 38553->38558 38554->38407 38555->38553 38556->38553 38557->38553 38558->38553 38560 306a412 38559->38560 38626 3068c9c 38560->38626 38630 3068ca8 38560->38630 38565 306a412 38564->38565 38567 3068c9c CreateProcessA 38565->38567 38568 3068ca8 CreateProcessA 38565->38568 38566 306a541 38566->38407 38567->38566 38568->38566 38570 306a812 38569->38570 38572 3068a20 WriteProcessMemory 38570->38572 38573 3068a1b WriteProcessMemory 38570->38573 38571 306a844 38571->38407 38572->38571 38573->38571 38576 306a412 38574->38576 38575 306a541 38575->38407 38577 3068c9c CreateProcessA 38576->38577 38578 3068ca8 CreateProcessA 38576->38578 38577->38575 38578->38575 38580 306a56c 38579->38580 38581 306acd5 38580->38581 38582 3068b10 ReadProcessMemory 38580->38582 38583 3068b08 ReadProcessMemory 38580->38583 38584 30683a0 ResumeThread 38580->38584 38585 3068398 ResumeThread 38580->38585 38581->38407 38582->38580 38583->38580 38584->38580 38585->38580 38587 30688cd Wow64SetThreadContext 38586->38587 38589 3068915 38587->38589 38589->38473 38591 30688cd Wow64SetThreadContext 38590->38591 38593 3068915 38591->38593 38593->38473 38595 30683e0 ResumeThread 38594->38595 38597 3068411 38595->38597 38597->38478 38599 30683e0 ResumeThread 38598->38599 38601 3068411 38599->38601 38601->38478 38603 3068b5b ReadProcessMemory 38602->38603 38605 3068b9f 38603->38605 38605->38478 38607 3068b5b ReadProcessMemory 38606->38607 38609 3068b9f 38607->38609 38609->38478 38611 3068a68 WriteProcessMemory 38610->38611 38613 3068abf 38611->38613 38613->38486 38615 3068a68 WriteProcessMemory 38614->38615 38617 3068abf 38615->38617 38617->38486 38619 30689a0 VirtualAllocEx 38618->38619 38621 30689dd 38619->38621 38621->38510 38623 30689a0 VirtualAllocEx 38622->38623 38625 30689dd 38623->38625 38625->38510 38627 3068d31 CreateProcessA 38626->38627 38629 3068ef3 38627->38629 38629->38629 38631 3068d31 CreateProcessA 38630->38631 38633 3068ef3 38631->38633 38633->38633 38634 1844668 38635 184467a 38634->38635 38636 1844686 38635->38636 38638 1844778 38635->38638 38639 184479d 38638->38639 38643 1844888 38639->38643 38647 1844879 38639->38647 38644 18448af 38643->38644 38646 184498c 38644->38646 38651 18444e0 38644->38651 38649 1844888 38647->38649 38648 184498c 38648->38648 38649->38648 38650 18444e0 CreateActCtxA 38649->38650 38650->38648 38652 1845918 CreateActCtxA 38651->38652 38654 18459db 38652->38654 38678 184d378 38679 184d3be GetCurrentProcess 38678->38679 38681 184d410 GetCurrentThread 38679->38681 38682 184d409 38679->38682 38683 184d446 38681->38683 38684 184d44d GetCurrentProcess 38681->38684 38682->38681 38683->38684 38685 184d483 38684->38685 38686 184d4ab GetCurrentThreadId 38685->38686 38687 184d4dc 38686->38687 38655 5770c58 38656 5770c5d 38655->38656 38657 5770d32 38656->38657 38659 5771b30 38656->38659 38663 5771b84 38659->38663 38667 5771b90 38659->38667 38664 5771b90 CreateWindowExW 38663->38664 38666 5771cb4 38664->38666 38666->38666 38668 5771bf8 CreateWindowExW 38667->38668 38670 5771cb4 38668->38670 38670->38670 38688 5776f48 38689 5776f49 38688->38689 38696 577bd61 38689->38696 38702 577bd70 38689->38702 38690 5777314 38694 577bd61 GetCurrentThreadId 38690->38694 38695 577bd70 GetCurrentThreadId 38690->38695 38691 5777370 38694->38691 38695->38691 38697 577bd68 38696->38697 38701 577bd94 38697->38701 38708 5779a44 38697->38708 38699 577bdb8 38700 5779a44 GetCurrentThreadId 38699->38700 38700->38701 38701->38690 38703 577bd75 38702->38703 38704 5779a44 GetCurrentThreadId 38703->38704 38707 577bd94 38703->38707 38705 577bdb8 38704->38705 38706 5779a44 GetCurrentThreadId 38705->38706 38706->38707 38707->38690 38709 5779a49 38708->38709 38710 577c0df GetCurrentThreadId 38709->38710 38711 577c0ca 38709->38711 38710->38711 38711->38699

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 571 5776f48-5776f73 574 5776f75 571->574 575 5776f7a-57772ae call 5776c8c call 5776c9c * 2 call 5776cac * 2 call 5776c9c * 2 call 5776cac * 2 call 5776c9c * 2 call 5776cac * 2 call 5776c9c * 2 571->575 574->575 1052 57772b1 call 577ab50 575->1052 1053 57772b1 call 577ab80 575->1053 638 57772b4-577730e call 5776cbc 1054 5777311 call 577bd61 638->1054 1055 5777311 call 577bd70 638->1055 643 5777314-577736a call 5776cbc * 2 1056 577736d call 577bd61 643->1056 1057 577736d call 577bd70 643->1057 649 5777370-5777f12 call 5776cbc * 9 call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d0c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d1c call 5776ccc call 5776cdc call 5776cec 794 5777f40-5777f65 call 5776d4c 649->794 797 5777f67-5777f90 794->797 798 5777f92-5777f94 794->798 799 5777f9a-5777fa8 797->799 798->799 801 5777f14-5777f2f 799->801 802 5777fae-57780ec 799->802 803 5777f3b-5777f3d 801->803 814 57780ee-57780f7 802->814 815 57780f9-5778100 802->815 803->794 816 5778110-577944a call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d5c call 5776d6c call 5776d7c call 5776cbc * 3 call 5776cdc call 5776d8c 814->816 817 5778107-577810a 815->817 818 5778102 815->818 1051 5779451-5779459 816->1051 817->816 818->817 1052->638 1053->638 1054->643 1055->643 1056->649 1057->649
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Aq
                                  • API String ID: 0-3665547428
                                  • Opcode ID: 036e62deb0ba3b5f45a85a7b62aab8280f2794769a3a068b31972c7edae58211
                                  • Instruction ID: 943829b32455516341871d8a018609bacbeda583f7476d196b4d16232dd8e82b
                                  • Opcode Fuzzy Hash: 036e62deb0ba3b5f45a85a7b62aab8280f2794769a3a068b31972c7edae58211
                                  • Instruction Fuzzy Hash: 6033E734A10229CFCB25DF24D988E99B7B5FF89304F1181E9E509AB365DB31AE85CF44

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1058 5776f38-5776f3a 1059 5776f41-5776f42 1058->1059 1060 5776f3c-5776f40 1058->1060 1061 5776f44-5776f46 1059->1061 1062 5776f49-5776f4c 1059->1062 1060->1059 1063 5776f4d-5776f73 1061->1063 1064 5776f48 1061->1064 1062->1063 1065 5776f75 1063->1065 1066 5776f7a-5776f8d 1063->1066 1064->1062 1065->1066 1067 5776f97-5776fa3 call 5776c8c 1066->1067 1069 5776fa8-5776fbf 1067->1069 1071 5776fc9-5776fd5 call 5776c9c 1069->1071 1073 5776fda-5777023 call 5776c9c 1071->1073 1079 577702d-5777039 call 5776cac 1073->1079 1081 577703e-577728f call 5776cac call 5776c9c * 2 call 5776cac * 2 call 5776c9c * 2 call 5776cac * 2 call 5776c9c * 2 1079->1081 1128 577729a-57772ae 1081->1128 1543 57772b1 call 577ab50 1128->1543 1544 57772b1 call 577ab80 1128->1544 1129 57772b4-57772c4 1130 57772cd-57772e0 1129->1130 1131 57772e6-57772f5 call 5776cbc 1130->1131 1133 57772fa-577730e 1131->1133 1545 5777311 call 577bd61 1133->1545 1546 5777311 call 577bd70 1133->1546 1134 5777314-5777351 call 5776cbc * 2 1139 5777356-577736a 1134->1139 1547 577736d call 577bd61 1139->1547 1548 577736d call 577bd70 1139->1548 1140 5777370-5777593 call 5776cbc * 9 call 5776ccc call 5776cdc 1173 577759d-57775b7 call 5776cec 1140->1173 1175 57775bc-57776bf call 5776cfc call 5776d0c call 5776d1c 1173->1175 1187 57776ca-57776e4 call 5776ccc 1175->1187 1189 57776e9-57779cd call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c 1187->1189 1226 57779d2-57779e6 1189->1226 1227 57779ec-5777f12 call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d1c call 5776ccc call 5776cdc call 5776cec 1226->1227 1285 5777f40-5777f65 call 5776d4c 1227->1285 1288 5777f67-5777f90 1285->1288 1289 5777f92-5777f94 1285->1289 1290 5777f9a-5777fa8 1288->1290 1289->1290 1292 5777f14-5777f2f 1290->1292 1293 5777fae-5778033 1290->1293 1294 5777f3b-5777f3d 1292->1294 1299 577803e-577805c 1293->1299 1294->1285 1300 5778067-57780a4 1299->1300 1302 57780ab-57780c3 1300->1302 1303 57780cf-57780ec 1302->1303 1305 57780ee-57780f7 1303->1305 1306 57780f9-5778100 1303->1306 1307 5778110-577933e call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d3c call 5776d1c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776ccc call 5776cdc call 5776cec call 5776cfc call 5776d2c call 5776d3c call 5776d5c call 5776d6c call 5776d7c call 5776cbc 1305->1307 1308 5778107-577810a 1306->1308 1309 5778102 1306->1309 1526 5779343-577935d 1307->1526 1308->1307 1309->1308 1527 5779363-5779396 call 5776cbc * 2 1526->1527 1532 577939b-57793b5 1527->1532 1533 57793bb-5779414 call 5776cdc 1532->1533 1538 5779419-577944a call 5776d8c 1533->1538 1542 5779451-5779459 1538->1542 1543->1129 1544->1129 1545->1134 1546->1134 1547->1140 1548->1140
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: $Aq
                                  • API String ID: 0-3665547428
                                  • Opcode ID: 3b1b0cb51b84c44ac1ab5ab21bf6279dee512cc9385137bf393bef6a0cd07120
                                  • Instruction ID: 88a43c52fb9c477cce954d8477da67fa0f8ce05accf4d477fcab27db3e8c6678
                                  • Opcode Fuzzy Hash: 3b1b0cb51b84c44ac1ab5ab21bf6279dee512cc9385137bf393bef6a0cd07120
                                  • Instruction Fuzzy Hash: A533E734A00629CFCB25DF24D988E99B7B5FF89304F1181E9E509AB365DB31AE85CF44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: afa2090520f29482b76816c59cdc279637de4aad4a727c0db6115f291f3653c7
                                  • Instruction ID: ff340d05cbc3bf9ccad2cacd5682a13bbe7e7938d0ecd55b07000fdfc2e81e30
                                  • Opcode Fuzzy Hash: afa2090520f29482b76816c59cdc279637de4aad4a727c0db6115f291f3653c7
                                  • Instruction Fuzzy Hash: 3C41E6B4D052588FDB18CFA6C8547EEBBFABF89300F04D4AAD409A6259DB740946CF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b37fb7602efa3fbb8939f6174c72a4a56e4f7b367136377ea50a74ef51c8ff8b
                                  • Instruction ID: b1586a5fbf3df80e454c89282fba5d67fafb2f2aa4b9d33968188f8fe6421eb8
                                  • Opcode Fuzzy Hash: b37fb7602efa3fbb8939f6174c72a4a56e4f7b367136377ea50a74ef51c8ff8b
                                  • Instruction Fuzzy Hash: 1041E7B4D05218CBDB18CFA6C8543EEFBFABF88300F14D46AD409B6258DB7409468F90

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 294 184d368-184d370 295 184d372-184d407 GetCurrentProcess 294->295 296 184d32d-184d367 294->296 305 184d410-184d444 GetCurrentThread 295->305 306 184d409-184d40f 295->306 308 184d446-184d44c 305->308 309 184d44d-184d481 GetCurrentProcess 305->309 306->305 308->309 310 184d483-184d489 309->310 311 184d48a-184d4a5 call 184d548 309->311 310->311 315 184d4ab-184d4da GetCurrentThreadId 311->315 316 184d4e3-184d545 315->316 317 184d4dc-184d4e2 315->317 317->316
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0184D3F6
                                  • GetCurrentThread.KERNEL32 ref: 0184D433
                                  • GetCurrentProcess.KERNEL32 ref: 0184D470
                                  • GetCurrentThreadId.KERNEL32 ref: 0184D4C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID: 4'q
                                  • API String ID: 2063062207-1807707664
                                  • Opcode ID: e02c614952d714d41eb096b6f3cffd7782c05b1dfe823ba1cd470f959d40ec9e
                                  • Instruction ID: 26817578c75dcef032126e5767e3ec574e4e59ae8191f1cdce7ed43aa742dd87
                                  • Opcode Fuzzy Hash: e02c614952d714d41eb096b6f3cffd7782c05b1dfe823ba1cd470f959d40ec9e
                                  • Instruction Fuzzy Hash: 4A617AB0900309CFDB14DFAAD589B9EBBF1FF48304F208559E009A7261DB346945CF65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 324 184d378-184d407 GetCurrentProcess 328 184d410-184d444 GetCurrentThread 324->328 329 184d409-184d40f 324->329 330 184d446-184d44c 328->330 331 184d44d-184d481 GetCurrentProcess 328->331 329->328 330->331 332 184d483-184d489 331->332 333 184d48a-184d4a5 call 184d548 331->333 332->333 337 184d4ab-184d4da GetCurrentThreadId 333->337 338 184d4e3-184d545 337->338 339 184d4dc-184d4e2 337->339 339->338
                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 0184D3F6
                                  • GetCurrentThread.KERNEL32 ref: 0184D433
                                  • GetCurrentProcess.KERNEL32 ref: 0184D470
                                  • GetCurrentThreadId.KERNEL32 ref: 0184D4C9
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: a3ffdebd830c5607c0bd10da7b69b14b34e0a2516e80149d01c83e12e2b29b6c
                                  • Instruction ID: 35f6b9522e58aa12297b4eaf1ce9babf9f3fcab40336eb3956218aedcbe68876
                                  • Opcode Fuzzy Hash: a3ffdebd830c5607c0bd10da7b69b14b34e0a2516e80149d01c83e12e2b29b6c
                                  • Instruction Fuzzy Hash: E45155B0900309CFDB14DFAAD589B9EBBF1EB48314F20C529E119A72A0DB346945CF66

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1721 3068c9c-3068d3d 1723 3068d76-3068d96 1721->1723 1724 3068d3f-3068d49 1721->1724 1729 3068dcf-3068dfe 1723->1729 1730 3068d98-3068da2 1723->1730 1724->1723 1725 3068d4b-3068d4d 1724->1725 1727 3068d70-3068d73 1725->1727 1728 3068d4f-3068d59 1725->1728 1727->1723 1731 3068d5d-3068d6c 1728->1731 1732 3068d5b 1728->1732 1740 3068e37-3068ef1 CreateProcessA 1729->1740 1741 3068e00-3068e0a 1729->1741 1730->1729 1733 3068da4-3068da6 1730->1733 1731->1731 1734 3068d6e 1731->1734 1732->1731 1735 3068da8-3068db2 1733->1735 1736 3068dc9-3068dcc 1733->1736 1734->1727 1738 3068db6-3068dc5 1735->1738 1739 3068db4 1735->1739 1736->1729 1738->1738 1742 3068dc7 1738->1742 1739->1738 1752 3068ef3-3068ef9 1740->1752 1753 3068efa-3068f80 1740->1753 1741->1740 1743 3068e0c-3068e0e 1741->1743 1742->1736 1745 3068e10-3068e1a 1743->1745 1746 3068e31-3068e34 1743->1746 1747 3068e1e-3068e2d 1745->1747 1748 3068e1c 1745->1748 1746->1740 1747->1747 1749 3068e2f 1747->1749 1748->1747 1749->1746 1752->1753 1763 3068f82-3068f86 1753->1763 1764 3068f90-3068f94 1753->1764 1763->1764 1767 3068f88 1763->1767 1765 3068f96-3068f9a 1764->1765 1766 3068fa4-3068fa8 1764->1766 1765->1766 1768 3068f9c 1765->1768 1769 3068faa-3068fae 1766->1769 1770 3068fb8-3068fbc 1766->1770 1767->1764 1768->1766 1769->1770 1771 3068fb0 1769->1771 1772 3068fce-3068fd5 1770->1772 1773 3068fbe-3068fc4 1770->1773 1771->1770 1774 3068fd7-3068fe6 1772->1774 1775 3068fec 1772->1775 1773->1772 1774->1775 1776 3068fed 1775->1776 1776->1776
                                  APIs
                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 03068EDE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: b87648710db7f49f2beb40bffdb051b4628334af27f02d24fb1c1adae62b24d1
                                  • Instruction ID: d62e5c1d7b4d3d8a31c9d4bbd27fc5cb8a92ba5f065d395c924a892cc5791dfc
                                  • Opcode Fuzzy Hash: b87648710db7f49f2beb40bffdb051b4628334af27f02d24fb1c1adae62b24d1
                                  • Instruction Fuzzy Hash: 57A14971D01619DFEB24CFA8C841BEDBBF2BF48310F1485A9E818A7284DB759985CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1778 3068ca8-3068d3d 1780 3068d76-3068d96 1778->1780 1781 3068d3f-3068d49 1778->1781 1786 3068dcf-3068dfe 1780->1786 1787 3068d98-3068da2 1780->1787 1781->1780 1782 3068d4b-3068d4d 1781->1782 1784 3068d70-3068d73 1782->1784 1785 3068d4f-3068d59 1782->1785 1784->1780 1788 3068d5d-3068d6c 1785->1788 1789 3068d5b 1785->1789 1797 3068e37-3068ef1 CreateProcessA 1786->1797 1798 3068e00-3068e0a 1786->1798 1787->1786 1790 3068da4-3068da6 1787->1790 1788->1788 1791 3068d6e 1788->1791 1789->1788 1792 3068da8-3068db2 1790->1792 1793 3068dc9-3068dcc 1790->1793 1791->1784 1795 3068db6-3068dc5 1792->1795 1796 3068db4 1792->1796 1793->1786 1795->1795 1799 3068dc7 1795->1799 1796->1795 1809 3068ef3-3068ef9 1797->1809 1810 3068efa-3068f80 1797->1810 1798->1797 1800 3068e0c-3068e0e 1798->1800 1799->1793 1802 3068e10-3068e1a 1800->1802 1803 3068e31-3068e34 1800->1803 1804 3068e1e-3068e2d 1802->1804 1805 3068e1c 1802->1805 1803->1797 1804->1804 1806 3068e2f 1804->1806 1805->1804 1806->1803 1809->1810 1820 3068f82-3068f86 1810->1820 1821 3068f90-3068f94 1810->1821 1820->1821 1824 3068f88 1820->1824 1822 3068f96-3068f9a 1821->1822 1823 3068fa4-3068fa8 1821->1823 1822->1823 1825 3068f9c 1822->1825 1826 3068faa-3068fae 1823->1826 1827 3068fb8-3068fbc 1823->1827 1824->1821 1825->1823 1826->1827 1828 3068fb0 1826->1828 1829 3068fce-3068fd5 1827->1829 1830 3068fbe-3068fc4 1827->1830 1828->1827 1831 3068fd7-3068fe6 1829->1831 1832 3068fec 1829->1832 1830->1829 1831->1832 1833 3068fed 1832->1833 1833->1833
                                  APIs
                                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 03068EDE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: CreateProcess
                                  • String ID:
                                  • API String ID: 963392458-0
                                  • Opcode ID: 312e1286c4a010dbb85a1f2339190ed161e3abf0b267cd2bceed5a63be6a634d
                                  • Instruction ID: d12d57d22c2335e94e51846c960938dcad16d7c9238c626c941c1ea431a9e545
                                  • Opcode Fuzzy Hash: 312e1286c4a010dbb85a1f2339190ed161e3abf0b267cd2bceed5a63be6a634d
                                  • Instruction Fuzzy Hash: A2914A71D017199FEB24CFA8C841BEDBBF6BF48310F1485A9E818A7284DB749985CF91

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1835 5771b84-5771bf6 1837 5771c01-5771c08 1835->1837 1838 5771bf8-5771bfe 1835->1838 1839 5771c13-5771cb2 CreateWindowExW 1837->1839 1840 5771c0a-5771c10 1837->1840 1838->1837 1842 5771cb4-5771cba 1839->1842 1843 5771cbb-5771cf3 1839->1843 1840->1839 1842->1843 1847 5771cf5-5771cf8 1843->1847 1848 5771d00 1843->1848 1847->1848 1849 5771d01 1848->1849 1849->1849
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05771CA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: ced28060378eaa0ece7e360983eab8b569fb7e29316b6e06d67644182ab5d7ad
                                  • Instruction ID: 2ee81537a502a60aa9c7ce22c9137c338a3ddeb53bae952692bf6264c5d81da8
                                  • Opcode Fuzzy Hash: ced28060378eaa0ece7e360983eab8b569fb7e29316b6e06d67644182ab5d7ad
                                  • Instruction Fuzzy Hash: 5D51DEB1C103099FDF14CFA9D884ADEBBB5BF48310F64822AE819AB210D775A845DF90
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05771CA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 80a02e4aaee85d058130c1e646a48204eb36c037cbfdb301b19d590ac3ede8c7
                                  • Instruction ID: 5ae8be3c6f389392f4c73337e386a3c42f951798da1a1411452d6f5ff70a466b
                                  • Opcode Fuzzy Hash: 80a02e4aaee85d058130c1e646a48204eb36c037cbfdb301b19d590ac3ede8c7
                                  • Instruction Fuzzy Hash: 5741CEB1D1030D9FDF14CF9AD984ADEBBB5BF48310F64822AE819AB210D775A945CF90
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 018459C9
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 8c6c678f1889e4af0c88a770dac0a1e19c7fff432a7e0f409c719610dc1fac4f
                                  • Instruction ID: 5cae51138bbb9ce8d0b81da6b9d05cdd8c2f9fc49d9ae84475fd25ba6d9419ca
                                  • Opcode Fuzzy Hash: 8c6c678f1889e4af0c88a770dac0a1e19c7fff432a7e0f409c719610dc1fac4f
                                  • Instruction Fuzzy Hash: C541C2B1C0071DCBDB24DFA9C884B8DBBF5BF49314F20816AE508AB251DB756A46CF50
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 018459C9
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 6e0e4893cd718f1c54a409fd484586381c5654dabb2dfe282c88abc52f3346b7
                                  • Instruction ID: add92c2dfc62e59fb23bd3f2e5ff2ac3ae4c396eaab39a601e9f2a9adac83c62
                                  • Opcode Fuzzy Hash: 6e0e4893cd718f1c54a409fd484586381c5654dabb2dfe282c88abc52f3346b7
                                  • Instruction Fuzzy Hash: AD41C3B1C0071DCBDB24DFA9C884B9DBBF5BF49314F20816AE508AB251DB756A46CF90
                                  APIs
                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 05774221
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: CallProcWindow
                                  • String ID:
                                  • API String ID: 2714655100-0
                                  • Opcode ID: c94fd2d5d1acd37548220009a36471f86dde3455ef1973268e8d76119f064844
                                  • Instruction ID: f8a5bb04afb045ab7ab25e04ea7e829e528c4de70f0fc34e93635ba61e2874e5
                                  • Opcode Fuzzy Hash: c94fd2d5d1acd37548220009a36471f86dde3455ef1973268e8d76119f064844
                                  • Instruction Fuzzy Hash: 784117B8900209DFCB14DF99C488AAABBF6FF88314F25C459E519A7321D774A841CFA0
                                  APIs
                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 03068AB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: 187b7303def50175e280a86c09dc6cf6dc39ecb12c1d0dd3d3e82bbf5f897a8e
                                  • Instruction ID: 4b2a506c5e0e96bee8a93a314aa7c875db8b0a8132b2375ccf5a0f0e31dbec0d
                                  • Opcode Fuzzy Hash: 187b7303def50175e280a86c09dc6cf6dc39ecb12c1d0dd3d3e82bbf5f897a8e
                                  • Instruction Fuzzy Hash: AA212475D003099FDB20CFA9C885BEEBBF1FF48310F14852AE919A7240C7789955CBA0
                                  APIs
                                  • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 03068AB0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: MemoryProcessWrite
                                  • String ID:
                                  • API String ID: 3559483778-0
                                  • Opcode ID: a04513bd0819123ca5c974467b9088c101136af05483e15cbfdb6633863e1a46
                                  • Instruction ID: 3d36b52978d0d0b7613894cd15f83288f118bd00d1fa70de9e6380a69a31094e
                                  • Opcode Fuzzy Hash: a04513bd0819123ca5c974467b9088c101136af05483e15cbfdb6633863e1a46
                                  • Instruction Fuzzy Hash: 71212575D003099FDB10DFAAC885BEEBBF5FF48310F54842AE919A7240D7789951CBA4
                                  APIs
                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 03068B90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 74ad00b9b12ef04182c1ec5162ecbc835cd9bded84c0c8b854bd6fdaeff749ec
                                  • Instruction ID: f51e041d37733f1fd1713642b879d378848f6118fb2aa85d3031577532bf3fba
                                  • Opcode Fuzzy Hash: 74ad00b9b12ef04182c1ec5162ecbc835cd9bded84c0c8b854bd6fdaeff749ec
                                  • Instruction Fuzzy Hash: 102115B1C012099FDB10CFAAC881BEEBBF1FF48310F548529E519A7250C7389941CBA0
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 03068906
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: 61982032f1263fbdb36e20b467a61f04d8dfa03c6c07a7adc7a0f543ed9bf0dd
                                  • Instruction ID: ea59c893d24a060b3e39acdae078449ee743218ed74a5115609d8e76eedb93b0
                                  • Opcode Fuzzy Hash: 61982032f1263fbdb36e20b467a61f04d8dfa03c6c07a7adc7a0f543ed9bf0dd
                                  • Instruction Fuzzy Hash: B7212571D003098FDB24DFAAC885BEEBBF0EB48310F54852AD459A7240CB789A45CFA1
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184D647
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 568fe743781f1239aacd88e3d9a49d8bb39dccc6a5ec5a28b4b94bcebe2f6bb5
                                  • Instruction ID: f36caf8517e8bf1299b1f575657c4d7e542cae090080def83c88586384b53428
                                  • Opcode Fuzzy Hash: 568fe743781f1239aacd88e3d9a49d8bb39dccc6a5ec5a28b4b94bcebe2f6bb5
                                  • Instruction Fuzzy Hash: F821F2B5C003099FDB10CF9AD884ADEBBF4EB48320F14801AE918A3350D774AA51CFA4
                                  APIs
                                  • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 03068B90
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: MemoryProcessRead
                                  • String ID:
                                  • API String ID: 1726664587-0
                                  • Opcode ID: 91800e376cca720e07a311e296d3c735d0bbe8f264ad29a92d77efa7caac78dd
                                  • Instruction ID: c708a58b9cf4860ba17e6550fe571876e79792ac25684acea79e7391f7d77e4d
                                  • Opcode Fuzzy Hash: 91800e376cca720e07a311e296d3c735d0bbe8f264ad29a92d77efa7caac78dd
                                  • Instruction Fuzzy Hash: 372105B1C003499FDB10DFAAC881BDEBBF5FF48310F508429E919A7240C7799901CBA4
                                  APIs
                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 03068906
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: ContextThreadWow64
                                  • String ID:
                                  • API String ID: 983334009-0
                                  • Opcode ID: c64d985ab78c385b1d0c3f949d8b072a234ced80d305592a21c6a125f2ad3fc7
                                  • Instruction ID: c91ebd5073c9eaa637d5d491ed4eb390280fd7b1f159a92eaa842b0eb3a21f82
                                  • Opcode Fuzzy Hash: c64d985ab78c385b1d0c3f949d8b072a234ced80d305592a21c6a125f2ad3fc7
                                  • Instruction Fuzzy Hash: 3A213471D003098FDB24DFAAC485BAEBBF4AB48220F54842AD459A7240CB789945CFA5
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0184D647
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 60b8508ffde8728e2f46ce129170af0f6ae872696d3082b770e6c84ddf760c6d
                                  • Instruction ID: 4690f4c0ae6e1bf7a9dd7a323d6bcd63fe7f9c25490489e71421a96b436af433
                                  • Opcode Fuzzy Hash: 60b8508ffde8728e2f46ce129170af0f6ae872696d3082b770e6c84ddf760c6d
                                  • Instruction Fuzzy Hash: 3321E4B5D002099FDB10CF9AD984ADEFBF4EB48310F14841AE918A3350C774A955CFA4
                                  APIs
                                  • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 030689CE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 841af88bf4801f8dc55b0188b6e44dfe76909b2aeadc908c11da989f59fd565e
                                  • Instruction ID: a12f467739be9fcb6b3f9b2c168ddfc375c1e4537926dc89dd0f2abe1659959a
                                  • Opcode Fuzzy Hash: 841af88bf4801f8dc55b0188b6e44dfe76909b2aeadc908c11da989f59fd565e
                                  • Instruction Fuzzy Hash: 34112971C002499FDF20DFA9C845BEEBBF5EF48310F14841AE915A7250C7759951CFA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: aa19f2c7ed9e21f4b02b0bea7787e209563dee5c5273715d35aea37310e4a0f3
                                  • Instruction ID: 08805c1a6d2a0373a6160a7e7385f3a23fea1c5fa8eae1d5d1238000b9364360
                                  • Opcode Fuzzy Hash: aa19f2c7ed9e21f4b02b0bea7787e209563dee5c5273715d35aea37310e4a0f3
                                  • Instruction Fuzzy Hash: 421176B0C003488FDB20DFAAC4457EEFBF0AF88324F24842AD459A7240CB795901CFA0
                                  APIs
                                  • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 030689CE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: 9e5339e337d399ea9053f7f67f8a2e9e71c5aa35b43cbb02903fc756c184f147
                                  • Instruction ID: 14724969d697eac151f2c746235591f3315db28ded5e842e0d08f86ac59e438d
                                  • Opcode Fuzzy Hash: 9e5339e337d399ea9053f7f67f8a2e9e71c5aa35b43cbb02903fc756c184f147
                                  • Instruction Fuzzy Hash: 87112671C003499FDB20DFAAC845BDEBBF5EF48320F14841AE515A7250CB759951CFA5
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: ResumeThread
                                  • String ID:
                                  • API String ID: 947044025-0
                                  • Opcode ID: 5e35fa816eb4ec030bec4fd082210519e3043e7d9cb24324baf7bbae068ff434
                                  • Instruction ID: 9f7311008ec8203f1029d61be555e91ce9e1cdaee1a1422001fcceb91109bdc0
                                  • Opcode Fuzzy Hash: 5e35fa816eb4ec030bec4fd082210519e3043e7d9cb24324baf7bbae068ff434
                                  • Instruction Fuzzy Hash: 121136B1D003498FDB24DFAAC4457EEFBF5EB88324F248429D519A7640CB79A941CFA4
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0184B626
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 7a5ac40b6ec7b567c4ed5386e4138faa81a3d5c68b87ed6a2c8cdb6c706d68f7
                                  • Instruction ID: bba315dc459a9961687fb61c09490cf04a9c0d1481125d11ac9534cad3ef0aac
                                  • Opcode Fuzzy Hash: 7a5ac40b6ec7b567c4ed5386e4138faa81a3d5c68b87ed6a2c8cdb6c706d68f7
                                  • Instruction Fuzzy Hash: D511DFB5C007498FDB24DF9AD844ADEFBF4AB88320F10842AD529A7210D779A645CFA5
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0306B58D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: 324117d38d148c0c074ac688dbe54a39e484389c68a06fb901bb1ec18ec1c0e0
                                  • Instruction ID: 8aba61c96a262c1f5d9f44a5d6784d5bf2242ddbeede14973d99ae7fb678f5eb
                                  • Opcode Fuzzy Hash: 324117d38d148c0c074ac688dbe54a39e484389c68a06fb901bb1ec18ec1c0e0
                                  • Instruction Fuzzy Hash: D81106B5800349DFDB20DF9AD485BDEFBF8EB48310F108419E514A7240D375AA54CFA1
                                  APIs
                                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0306B58D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID: MessagePost
                                  • String ID:
                                  • API String ID: 410705778-0
                                  • Opcode ID: e874aa8a388e5833ba113ef0ee2ca272d81e504cd9a271b331f426bdd4147cae
                                  • Instruction ID: f49bde329187ca440d4fcc98aaf36846c04b6a5c536cdc1e725627e216cfcd74
                                  • Opcode Fuzzy Hash: e874aa8a388e5833ba113ef0ee2ca272d81e504cd9a271b331f426bdd4147cae
                                  • Instruction Fuzzy Hash: 4C11E8B58003499FDB20DF9AD985BDEFFF8EB48320F14845AE558A7250C375A544CFA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338186286.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_14cd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9895d593dc6d8502275851909a5703117a87dc8a8e4dd53897805472feb07c7a
                                  • Instruction ID: 1280deb8d73e7bd1f91be622bdf738a9ef55cf4c935293dadb0c22fd901c544e
                                  • Opcode Fuzzy Hash: 9895d593dc6d8502275851909a5703117a87dc8a8e4dd53897805472feb07c7a
                                  • Instruction Fuzzy Hash: 4521007A904200DFDB55DF54D9C0B26BF61EB98628F20857EE9090A266C336D406CAA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338186286.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_14cd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9dac7d94472be784a31a19fb4f596bc8bad0f1295a93eb636d16755ec5771509
                                  • Instruction ID: b4f8ac34e9f72d1ffe9964ab4b3f5d679f9a13d55fdd927b52b9b0a58c17027c
                                  • Opcode Fuzzy Hash: 9dac7d94472be784a31a19fb4f596bc8bad0f1295a93eb636d16755ec5771509
                                  • Instruction Fuzzy Hash: 3D210279904200DFDB05DF44D9C0B66BB65EB84724F20C17EDA090A266C336E447CAA2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338672363.00000000015FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_15fd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8ba86343260fd3bae4f61a3cda77e6a1d1a9d4dd0c46a1a15aed22f856e1f5ea
                                  • Instruction ID: 4a787cc39ff83757f300ddd21c2b45ffbc515a7f28a244aa81759c1cbbf7f762
                                  • Opcode Fuzzy Hash: 8ba86343260fd3bae4f61a3cda77e6a1d1a9d4dd0c46a1a15aed22f856e1f5ea
                                  • Instruction Fuzzy Hash: 15210075604200DFDB15DF54D984B2ABBB9FB84314F20C96DEA0A4F286D33AD807CA62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338672363.00000000015FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_15fd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 63e1848a2437da06fb684fa7124e618610fb9baf63d6f16f47f087d09157d038
                                  • Instruction ID: 7116f1dff5a2bf806691b0a34c6c7fbc1dcd18ddb5fd9ed1476e748da413f415
                                  • Opcode Fuzzy Hash: 63e1848a2437da06fb684fa7124e618610fb9baf63d6f16f47f087d09157d038
                                  • Instruction Fuzzy Hash: 96210779604300DFDB15DF94D9C4B1ABBB5FB84324F20C96DDA494F256C336D446CAA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338672363.00000000015FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_15fd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd6c0d41d8dbcb68d173d94092eca3a6a51178b6b9acce4cac264c0dad620c09
                                  • Instruction ID: 966bfcc53304addf85ad822f96c31cecccc77a566d4a2921ec2d2766e8c0daa8
                                  • Opcode Fuzzy Hash: cd6c0d41d8dbcb68d173d94092eca3a6a51178b6b9acce4cac264c0dad620c09
                                  • Instruction Fuzzy Hash: DF217C755093808FCB06CF24D990715BF71FB46214F28C5EAD9498F6A7C33A980ACB62
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338186286.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_14cd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                  • Instruction ID: c661a1d29206a33fbcb34c87cb054b1b48b7529abb2772e35a3a5db3601420d1
                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                  • Instruction Fuzzy Hash: 1611CD76904240DFCB06CF44D9C0B56BF62FB84324F2482BED9090A266C33AE456CBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338186286.00000000014CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 014CD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_14cd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                  • Instruction ID: 28d3ea338ad6e689f9d8f95dcb6a9e8b7d361e761da2944020c3a08577364608
                                  • Opcode Fuzzy Hash: 099256442a3ab3004f72329a4e4b6c70090b87d396c4978555b43c732be305a7
                                  • Instruction Fuzzy Hash: 7011AF7A904280CFCB16CF54D9C4B16BF72FB94724F24C6AED8490B666C336D456CBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1338672363.00000000015FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 015FD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_15fd000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                  • Instruction ID: b425fab87940bf345fc335a796c5b8eeb5cb487662b5a8fd850cb9ffdf385498
                                  • Opcode Fuzzy Hash: 4ccb17c466d2e34b86bde66ac975e9cbefd8e24c09005379d072ef0b40a0d1c0
                                  • Instruction Fuzzy Hash: 3411BB79504280DFCB06CF54C5C0B19BBB2FB84324F24C6AED9494F296C33AD40ACBA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 190b0d437025fc376731eeb8355c7248be79145af1a6605f9792b54e08ead4f9
                                  • Instruction ID: 8eb7e442fffe819f261706390de230b4e912c87266918c08fee44ce4b45ef46b
                                  • Opcode Fuzzy Hash: 190b0d437025fc376731eeb8355c7248be79145af1a6605f9792b54e08ead4f9
                                  • Instruction Fuzzy Hash: 5EE18B35B027088FEB29DB79D450BAEB7F6AF89700F18846DD186DB294CB35E901CB51
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bbe370f046d819a095e2c491c1836bafc8c1a8e2acab1fe7d65e0e13c065cbf4
                                  • Instruction ID: ebd9b670957ffe2adef6c098502b3578e24985007a7c22fc3c201c82a45519a4
                                  • Opcode Fuzzy Hash: bbe370f046d819a095e2c491c1836bafc8c1a8e2acab1fe7d65e0e13c065cbf4
                                  • Instruction Fuzzy Hash: D5E1D874E002598FDB14CFA9C580AAEFBB2FF89304F2481A9D455AB355D735AD41CFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8a3473d694bd2ca0d94f365be4966746c3846cd0ad04cc67fb58bab71641a615
                                  • Instruction ID: 18ca3aa164cd4c42b8f016cf4acb7b44420a8a7bb19cf9c342b8ad2521a3e5ff
                                  • Opcode Fuzzy Hash: 8a3473d694bd2ca0d94f365be4966746c3846cd0ad04cc67fb58bab71641a615
                                  • Instruction Fuzzy Hash: AD1285B14117458AE730CF65E94C6893BB1BB61398F906329D2A12F2FDDBB8164BCF44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f8420a33d8bb9372d9c3c2d2b538eb1a35a34664141a09d13a4a11add1862712
                                  • Instruction ID: 781e5f5b41d63f65e7278e6e335b632a1bf77afc0398b0d9f4323883cf684963
                                  • Opcode Fuzzy Hash: f8420a33d8bb9372d9c3c2d2b538eb1a35a34664141a09d13a4a11add1862712
                                  • Instruction Fuzzy Hash: C2E1D674E012598BDB14CFA9D590AAEFBF2FB89304F2481A9D814AB359D7319D41CFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ed858b489686c8b7463f5b924a1c29f24272cbf1716167e1015d1e193d562eac
                                  • Instruction ID: 3d472a6ed7a60469e4de6bed6a880d73c3acbc45d378777f918ebeb4519b43bd
                                  • Opcode Fuzzy Hash: ed858b489686c8b7463f5b924a1c29f24272cbf1716167e1015d1e193d562eac
                                  • Instruction Fuzzy Hash: B3E1C774E012598FDB14DFA9C580AAEFBB2FF89304F2481A9D814AB359D7349D41CFA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5d6520122be9de5f728fdbffdff7e67d4d2717ee9535bbd267995c6cf26c9405
                                  • Instruction ID: d44a93deb2713dccc971e47fba10aad37ba050afaadc7d76f56e12c52981689d
                                  • Opcode Fuzzy Hash: 5d6520122be9de5f728fdbffdff7e67d4d2717ee9535bbd267995c6cf26c9405
                                  • Instruction Fuzzy Hash: DDE1D874E012598FDB14CFA9C580AAEFBB2FF89304F248159D815AB359D7359D41CFA0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fdd9b972228bdf4970fb1c3ef8c77a739541346f5941c106748d8025f574b2d4
                                  • Instruction ID: 78ad35336e3796ea5326c586ee4db77e118713cf3a17345e5620bc63d17edbf4
                                  • Opcode Fuzzy Hash: fdd9b972228bdf4970fb1c3ef8c77a739541346f5941c106748d8025f574b2d4
                                  • Instruction Fuzzy Hash: 21E1C774E012598FDB14DFA9CA84AAEFBB2FF89304F248169D814AB355D734AD41CF60
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339815646.0000000001840000.00000040.00000800.00020000.00000000.sdmp, Offset: 01840000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_1840000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d87fbdf2121b26190cad723dc97e728057b8c4e8ad98edd5d5cf150cb5bfd641
                                  • Instruction ID: 4ce997a951c0eaa25aa993b8de964dd97d24f53548198dfd16950ce578395dc3
                                  • Opcode Fuzzy Hash: d87fbdf2121b26190cad723dc97e728057b8c4e8ad98edd5d5cf150cb5bfd641
                                  • Instruction Fuzzy Hash: B7A15D32E0020A8FCF15DFB8D84459EBBB2FF95300B15856AE905EB265DF75DA15CB80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1346233596.0000000005770000.00000040.00000800.00020000.00000000.sdmp, Offset: 05770000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_5770000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a6ffe5f734b093c239071b1db00638fed5aeb995d701e78643cdf1b6290615f3
                                  • Instruction ID: 5b9a306366be9321d1b823ce5c0b87bab9593cd81e905b5ee877bca654cdd163
                                  • Opcode Fuzzy Hash: a6ffe5f734b093c239071b1db00638fed5aeb995d701e78643cdf1b6290615f3
                                  • Instruction Fuzzy Hash: F2C1F6B18117458BE730CF29E8482897BB1BB953A4F506329D2616F2FDDBB8164BCF44
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2f08a965aa8642974a6f7cfbd3043b918757bb0d720ee19c1452b22603006a0
                                  • Instruction ID: f806946483cc90cb261cef17b006c7642dc571468dc3357158cb2cc9ca8327b4
                                  • Opcode Fuzzy Hash: f2f08a965aa8642974a6f7cfbd3043b918757bb0d720ee19c1452b22603006a0
                                  • Instruction Fuzzy Hash: 0C51D870E052598BDB14CFA9C5805AEFBF2FF89304F2481A9D418AB356D7359D42CF61
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 146b9e14894486db4cbf6acb9c36cae9264fe513e98119060f11d9733040f048
                                  • Instruction ID: 2f23161ff445fe2b419103da4bafaabc80bebdb63ad07884ced76ab4f30d582a
                                  • Opcode Fuzzy Hash: 146b9e14894486db4cbf6acb9c36cae9264fe513e98119060f11d9733040f048
                                  • Instruction Fuzzy Hash: 8051F770E012598FDB14CFA9C5809AEFBF2FF89314F2481A9D418AB356D7349941CFA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1339981663.0000000003060000.00000040.00000800.00020000.00000000.sdmp, Offset: 03060000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_3060000_P87unxnF4t4DSrTt43.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d56f732c2a489d3db5b9e920752daf2358b47314519e4a8fe1178114bed46dc
                                  • Instruction ID: 22a8fda5d2d88db7aeb4e8d30f469ee9cdacd1bed1a2fd0a49c2a158def4b130
                                  • Opcode Fuzzy Hash: 9d56f732c2a489d3db5b9e920752daf2358b47314519e4a8fe1178114bed46dc
                                  • Instruction Fuzzy Hash: C051EA74E002198BDB18CFA9C6845AEFBF6FF89304F2481A9D418AB355D735AD41CFA1

                                  Execution Graph

                                  Execution Coverage:5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:6.4%
                                  Total number of Nodes:1648
                                  Total number of Limit Nodes:49
                                  execution_graph 47271 415411 47310 401d64 47271->47310 47273 41541c 47315 43a7f7 47273->47315 47276 401d64 28 API calls 47277 415437 47276->47277 47319 401fbd 47277->47319 47279 415441 47280 401d64 28 API calls 47279->47280 47281 41545c 47280->47281 47282 401fbd 28 API calls 47281->47282 47283 415467 47282->47283 47284 401fbd 28 API calls 47283->47284 47285 415476 47284->47285 47286 4154c3 47285->47286 47287 41547a 47285->47287 47289 417aa9 193 API calls 47286->47289 47368 417aa9 47287->47368 47290 4154cf 47289->47290 47292 401d64 28 API calls 47290->47292 47294 4154da 47292->47294 47293 401d64 28 API calls 47295 415491 47293->47295 47296 43a7f7 _strftime 42 API calls 47294->47296 47297 43a7f7 _strftime 42 API calls 47295->47297 47298 4154e7 47296->47298 47299 41549e 47297->47299 47300 401d64 28 API calls 47298->47300 47301 401d64 28 API calls 47299->47301 47302 4154f8 47300->47302 47303 4154af 47301->47303 47304 43a7f7 _strftime 42 API calls 47302->47304 47305 43a7f7 _strftime 42 API calls 47303->47305 47306 4154bc 47304->47306 47305->47306 47323 417c7e 47306->47323 47308 415527 47309 417c7e 95 API calls 47308->47309 47309->47308 47312 401d6c 47310->47312 47311 401d74 47311->47273 47312->47311 47429 401fff 28 API calls 47312->47429 47316 43a810 _strftime 47315->47316 47430 439b4e 47316->47430 47320 401fcc 47319->47320 47464 402501 47320->47464 47322 401fea 47322->47279 47469 401f66 47323->47469 47327 417cb3 47328 417ce1 47327->47328 47329 417cc2 47327->47329 47332 417d1f 47328->47332 47333 417cee 47328->47333 47330 401fbd 28 API calls 47329->47330 47331 417cd3 47330->47331 47334 404468 60 API calls 47331->47334 47514 417dd2 47332->47514 47555 417f8c 63 API calls 47333->47555 47337 417cdc 47334->47337 47340 401eea 26 API calls 47337->47340 47338 417d0c 47556 401eef 47338->47556 47343 417dc1 47340->47343 47342 401eef 26 API calls 47345 417d38 47342->47345 47346 401eea 26 API calls 47343->47346 47344 417d15 47347 401eea 26 API calls 47344->47347 47348 401eea 26 API calls 47345->47348 47349 417dc9 47346->47349 47350 417d1d 47347->47350 47348->47350 47349->47308 47526 41b1a9 47350->47526 47354 417d75 47533 4027cb 47354->47533 47356 417d80 47357 4027cb 28 API calls 47356->47357 47358 417d8a 47357->47358 47536 404468 47358->47536 47362 417d9e 47363 401eea 26 API calls 47362->47363 47364 417da6 47363->47364 47365 401eea 26 API calls 47364->47365 47366 417db1 47365->47366 47367 401eea 26 API calls 47366->47367 47367->47337 47624 401ebd 47368->47624 47371 401ebd 28 API calls 47372 417ada 47371->47372 47373 417aff ___scrt_fastfail 47372->47373 47374 417af0 GdiplusStartup 47372->47374 47628 4187e7 47373->47628 47374->47373 47378 417b38 47638 401e13 47378->47638 47380 417b41 47381 417b4e 47380->47381 47715 4047eb WaitForSingleObject 47380->47715 47642 418167 DeleteDC 47381->47642 47384 417b53 47643 4041f1 47384->47643 47386 417b5a 47387 417c53 47386->47387 47650 40428c connect 47386->47650 47388 4047eb 98 API calls 47387->47388 47415 417c51 47388->47415 47391 401eea 26 API calls 47394 417c66 47391->47394 47392 417b72 47710 4045aa CreateThread 47392->47710 47396 401eea 26 API calls 47394->47396 47395 417b7e 47398 417c1f 47395->47398 47399 417b9e 47395->47399 47397 415486 47396->47397 47397->47293 47711 4027ec 47398->47711 47728 41b073 28 API calls 47399->47728 47402 417ba8 47729 41af51 47402->47729 47403 417c32 47405 4027cb 28 API calls 47403->47405 47407 417c3c 47405->47407 47408 404468 60 API calls 47407->47408 47410 417c1d 47408->47410 47409 4027ec 28 API calls 47411 417bcb 47409->47411 47413 401eea 26 API calls 47410->47413 47734 40275c 47411->47734 47413->47415 47414 417bd7 47416 4027cb 28 API calls 47414->47416 47415->47391 47417 417be3 47416->47417 47418 40275c 28 API calls 47417->47418 47419 417bed 47418->47419 47420 404468 60 API calls 47419->47420 47421 417bf7 47420->47421 47422 401eea 26 API calls 47421->47422 47423 417c02 47422->47423 47424 401eea 26 API calls 47423->47424 47425 417c0b 47424->47425 47426 401eea 26 API calls 47425->47426 47427 417c14 47426->47427 47428 401eea 26 API calls 47427->47428 47428->47410 47448 43a755 47430->47448 47432 439b9b 47457 4394ee 38 API calls 2 library calls 47432->47457 47434 439b60 47434->47432 47435 439b75 47434->47435 47447 415429 47434->47447 47455 445564 20 API calls _free 47435->47455 47437 439b7a 47456 43aa37 26 API calls _Deallocate 47437->47456 47440 439ba7 47441 439bd6 47440->47441 47458 43a79a 42 API calls __Tolower 47440->47458 47442 439c42 47441->47442 47459 43a701 26 API calls 2 library calls 47441->47459 47460 43a701 26 API calls 2 library calls 47442->47460 47445 439d09 _strftime 47445->47447 47461 445564 20 API calls _free 47445->47461 47447->47276 47449 43a75a 47448->47449 47450 43a76d 47448->47450 47462 445564 20 API calls _free 47449->47462 47450->47434 47452 43a75f 47463 43aa37 26 API calls _Deallocate 47452->47463 47454 43a76a 47454->47434 47455->47437 47456->47447 47457->47440 47458->47440 47459->47442 47460->47445 47461->47447 47462->47452 47463->47454 47465 40250d 47464->47465 47467 40252b 47465->47467 47468 40261a 28 API calls 47465->47468 47467->47322 47468->47467 47470 401f6e 47469->47470 47560 402301 47470->47560 47473 418195 CreateDCA CreateCompatibleDC 47569 418648 47473->47569 47475 4181ce 47476 41859d 47475->47476 47478 418235 CreateCompatibleBitmap 47475->47478 47477 401f66 28 API calls 47476->47477 47513 418582 47477->47513 47479 418249 DeleteDC DeleteDC 47478->47479 47480 41825f SelectObject 47478->47480 47481 418597 DeleteObject 47479->47481 47482 418584 DeleteDC DeleteDC 47480->47482 47483 41826f StretchBlt 47480->47483 47481->47476 47482->47481 47483->47482 47485 418297 47483->47485 47484 418318 47486 41835c GetObjectA 47484->47486 47487 41832b BitBlt 47484->47487 47488 41834c 47484->47488 47485->47484 47490 4182b5 GetIconInfo 47485->47490 47486->47482 47493 418377 47486->47493 47487->47486 47488->47486 47489 41838b 47491 4183c2 LocalAlloc 47489->47491 47490->47484 47492 4182cb DeleteObject DeleteObject DrawIcon 47490->47492 47494 4183e2 GlobalAlloc 47491->47494 47492->47484 47493->47489 47493->47491 47495 4183a7 47493->47495 47494->47482 47498 418450 GetDIBits 47494->47498 47495->47489 47497 4183ac LocalAlloc 47495->47497 47497->47494 47499 41846b DeleteDC DeleteDC DeleteObject GlobalFree 47498->47499 47500 418491 47498->47500 47499->47476 47501 402325 28 API calls 47500->47501 47502 4184e9 47501->47502 47503 402325 28 API calls 47502->47503 47504 418506 47503->47504 47505 402325 28 API calls 47504->47505 47506 418528 47505->47506 47507 418539 DeleteObject GlobalFree DeleteDC 47506->47507 47508 41855b DeleteDC 47507->47508 47509 41855e 47507->47509 47508->47509 47510 401eea 26 API calls 47509->47510 47511 418579 47510->47511 47512 401eea 26 API calls 47511->47512 47512->47513 47513->47327 47515 417df5 47514->47515 47574 417988 GdipLoadImageFromStream 47515->47574 47517 417e11 47575 4185b6 23 API calls _Yarn 47517->47575 47519 417e1f 47576 4179fb GdipSaveImageToStream 47519->47576 47521 417e67 47578 404be8 47521->47578 47523 417e80 47582 4179ab GdipDisposeImage 47523->47582 47525 417d2e 47525->47342 47527 41b1b4 47526->47527 47528 417d69 47527->47528 47529 401f66 28 API calls 47527->47529 47530 405cc5 47528->47530 47529->47528 47588 402ee5 47530->47588 47532 405cd3 47532->47354 47605 401e9b 47533->47605 47535 4027d9 47535->47356 47537 40447b 47536->47537 47538 404be8 28 API calls 47537->47538 47539 404490 _Yarn 47538->47539 47540 404507 WaitForSingleObject 47539->47540 47541 4044e7 47539->47541 47543 40451d 47540->47543 47542 4044f9 send 47541->47542 47544 404542 47542->47544 47614 420725 56 API calls 47543->47614 47546 401eea 26 API calls 47544->47546 47548 40454a 47546->47548 47547 404530 SetEvent 47547->47544 47549 401eea 26 API calls 47548->47549 47550 404552 47549->47550 47551 401eea 47550->47551 47552 4021b9 47551->47552 47553 4021e8 47552->47553 47615 40262e 47552->47615 47553->47362 47555->47338 47557 401efe 47556->47557 47559 401f0a 47557->47559 47623 4021b9 26 API calls 47557->47623 47559->47344 47561 40230d 47560->47561 47564 402325 47561->47564 47563 401f80 47563->47473 47565 40232f 47564->47565 47567 40233a 47565->47567 47568 40294a 28 API calls 47565->47568 47567->47563 47568->47567 47572 436260 47569->47572 47573 418666 EnumDisplaySettingsW 47572->47573 47573->47475 47574->47517 47575->47519 47577 417a1b 47576->47577 47577->47521 47579 404bf0 47578->47579 47583 404c0c 47579->47583 47581 404c06 47581->47523 47582->47525 47584 404c16 47583->47584 47586 404c21 47584->47586 47587 404d07 28 API calls 47584->47587 47586->47581 47587->47586 47589 402ef1 47588->47589 47592 4031b4 47589->47592 47591 402f04 47591->47532 47593 4031c5 47592->47593 47598 4032a4 47593->47598 47597 4031e5 47597->47591 47599 4032b0 47598->47599 47600 4031d1 47598->47600 47604 4032b6 28 API calls 47599->47604 47600->47597 47603 40379b 28 API calls 47600->47603 47603->47597 47606 401ea7 47605->47606 47609 40245c 47606->47609 47608 401eb9 47608->47535 47610 402469 47609->47610 47612 402478 47610->47612 47613 402ad3 28 API calls 47610->47613 47612->47608 47613->47612 47614->47547 47618 402bee 47615->47618 47617 40263b 47617->47553 47619 402bfb 47618->47619 47620 402c08 _Deallocate 47618->47620 47622 4015d8 26 API calls _Deallocate 47619->47622 47620->47617 47622->47620 47623->47559 47626 401ec9 47624->47626 47625 401ee4 47625->47371 47626->47625 47627 402325 28 API calls 47626->47627 47627->47625 47633 4187fe 47628->47633 47629 417b2d 47634 401e18 47629->47634 47632 401e13 26 API calls 47632->47633 47633->47629 47633->47632 47741 403b40 47633->47741 47745 4028cf 47633->47745 47635 401e27 47634->47635 47637 401e33 47635->47637 47766 402121 26 API calls 47635->47766 47637->47378 47639 402121 47638->47639 47640 402150 47639->47640 47767 402718 26 API calls _Deallocate 47639->47767 47640->47380 47642->47384 47644 404206 socket 47643->47644 47645 4041fd 47643->47645 47647 404220 47644->47647 47648 404224 CreateEventW 47644->47648 47768 404262 WSAStartup 47645->47768 47647->47386 47648->47386 47649 404202 47649->47644 47649->47647 47651 4043e1 47650->47651 47652 4042b3 47650->47652 47653 4043e7 WSAGetLastError 47651->47653 47705 404343 47651->47705 47654 4042e8 47652->47654 47652->47705 47769 404cbf 47652->47769 47655 4043f7 47653->47655 47653->47705 47797 42035c 27 API calls 47654->47797 47657 4042f7 47655->47657 47658 4043fc 47655->47658 47664 401f66 28 API calls 47657->47664 47802 41be81 30 API calls 47658->47802 47660 4042d4 47665 401f66 28 API calls 47660->47665 47662 4042f0 47662->47657 47663 404306 47662->47663 47673 404315 47663->47673 47674 40434c 47663->47674 47667 404448 47664->47667 47668 4042e3 47665->47668 47666 40440b 47803 404c9e 28 API calls 47666->47803 47670 401f66 28 API calls 47667->47670 47773 41a891 47668->47773 47675 404457 47670->47675 47672 404418 47676 401f66 28 API calls 47672->47676 47677 401f66 28 API calls 47673->47677 47799 42113f 56 API calls 47674->47799 47678 41a891 79 API calls 47675->47678 47680 404427 47676->47680 47683 404324 47677->47683 47678->47705 47682 41a891 79 API calls 47680->47682 47681 404354 47684 404389 47681->47684 47685 404359 47681->47685 47686 40442c 47682->47686 47687 401f66 28 API calls 47683->47687 47801 4204f5 28 API calls 47684->47801 47688 401f66 28 API calls 47685->47688 47689 401eea 26 API calls 47686->47689 47690 404333 47687->47690 47692 404368 47688->47692 47689->47705 47693 41a891 79 API calls 47690->47693 47695 401f66 28 API calls 47692->47695 47696 404338 47693->47696 47694 404391 47697 4043be CreateEventW CreateEventW 47694->47697 47699 401f66 28 API calls 47694->47699 47698 404377 47695->47698 47798 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47696->47798 47697->47705 47700 41a891 79 API calls 47698->47700 47702 4043a7 47699->47702 47704 40437c 47700->47704 47703 401f66 28 API calls 47702->47703 47706 4043b6 47703->47706 47800 42079d 54 API calls 47704->47800 47705->47387 47705->47392 47708 41a891 79 API calls 47706->47708 47709 4043bb 47708->47709 47709->47697 47710->47395 47821 4045c6 47710->47821 47712 4027f8 47711->47712 47713 402e78 28 API calls 47712->47713 47714 402814 47713->47714 47714->47403 47716 404805 SetEvent CloseHandle 47715->47716 47717 40481c closesocket 47715->47717 47718 40489c 47716->47718 47719 404829 47717->47719 47718->47381 47720 40483f 47719->47720 48066 404ab1 83 API calls 47719->48066 47722 404851 WaitForSingleObject 47720->47722 47723 404892 SetEvent CloseHandle 47720->47723 48067 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47722->48067 47723->47718 47725 404860 SetEvent WaitForSingleObject 48068 41de20 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 47725->48068 47727 404878 SetEvent CloseHandle CloseHandle 47727->47723 47728->47402 48069 440e5e 47729->48069 47732 401f66 28 API calls 47733 417bbe 47732->47733 47733->47409 47738 40276b 47734->47738 47735 4027ad 47736 401e9b 28 API calls 47735->47736 47737 4027ab 47736->47737 47737->47414 47738->47735 47739 4027a2 47738->47739 47740 402ee5 28 API calls 47739->47740 47740->47737 47742 403b48 47741->47742 47748 403b7a 47742->47748 47757 402d8b 47745->47757 47747 4028dd 47747->47633 47749 403b86 47748->47749 47752 403b9e 47749->47752 47751 403b5a 47751->47633 47753 403ba8 47752->47753 47755 403bb3 47753->47755 47756 403cfd 28 API calls 47753->47756 47755->47751 47756->47755 47758 402d97 47757->47758 47761 4030f7 47758->47761 47760 402dab 47760->47747 47762 403101 47761->47762 47764 403115 47762->47764 47765 4036c2 28 API calls 47762->47765 47764->47760 47765->47764 47766->47637 47767->47640 47768->47649 47770 404ccb 47769->47770 47804 402e78 47770->47804 47772 404cee 47772->47660 47774 41a942 47773->47774 47775 41a8a7 GetLocalTime 47773->47775 47777 401eea 26 API calls 47774->47777 47776 404cbf 28 API calls 47775->47776 47778 41a8e9 47776->47778 47779 41a94a 47777->47779 47813 405ce6 47778->47813 47781 401eea 26 API calls 47779->47781 47783 41a952 47781->47783 47782 41a8f5 47784 4027cb 28 API calls 47782->47784 47783->47654 47785 41a901 47784->47785 47786 405ce6 28 API calls 47785->47786 47787 41a90d 47786->47787 47816 406478 76 API calls 47787->47816 47789 41a91b 47790 401eea 26 API calls 47789->47790 47791 41a927 47790->47791 47792 401eea 26 API calls 47791->47792 47793 41a930 47792->47793 47794 401eea 26 API calls 47793->47794 47795 41a939 47794->47795 47796 401eea 26 API calls 47795->47796 47796->47774 47797->47662 47798->47705 47799->47681 47800->47696 47801->47694 47802->47666 47803->47672 47805 402e85 47804->47805 47806 402e98 47805->47806 47808 402ea9 47805->47808 47809 402eae 47805->47809 47811 403445 28 API calls 47806->47811 47808->47772 47809->47808 47812 40225b 26 API calls 47809->47812 47811->47808 47812->47808 47817 404bc4 47813->47817 47815 405cf4 47815->47782 47816->47789 47818 404bd0 47817->47818 47819 40245c 28 API calls 47818->47819 47820 404be4 47819->47820 47820->47815 47824 4045d5 47821->47824 47835 4045ec 47824->47835 47828 401eef 26 API calls 47828->47835 47829 404666 47830 4047eb 98 API calls 47829->47830 47831 40466d 47830->47831 47833 401eea 26 API calls 47831->47833 47832 401eea 26 API calls 47832->47835 47834 404676 47833->47834 47836 401eea 26 API calls 47834->47836 47835->47828 47835->47829 47835->47832 47839 43aa9c 47835->47839 47846 40455b 47835->47846 47852 401f86 47835->47852 47856 404688 47835->47856 47837 4045d4 47836->47837 47844 446d0f _strftime 47839->47844 47840 446d4d 47869 445564 20 API calls _free 47840->47869 47842 446d38 RtlAllocateHeap 47843 446d4b 47842->47843 47842->47844 47843->47835 47844->47840 47844->47842 47868 442410 7 API calls 2 library calls 47844->47868 47847 404592 recv 47846->47847 47848 404565 WaitForSingleObject 47846->47848 47850 4045a5 47847->47850 47870 420761 56 API calls 47848->47870 47850->47835 47851 404581 SetEvent 47851->47850 47853 401f8e 47852->47853 47854 402325 28 API calls 47853->47854 47855 401fa4 47854->47855 47855->47835 47862 4046a3 47856->47862 47857 4047d8 47858 401eea 26 API calls 47857->47858 47859 4047e1 47858->47859 47859->47835 47860 403b60 28 API calls 47860->47862 47861 401eef 26 API calls 47861->47862 47862->47857 47862->47860 47862->47861 47863 401fbd 28 API calls 47862->47863 47864 401ebd 28 API calls 47862->47864 47866 401eea 26 API calls 47862->47866 47871 41894a 47862->47871 47863->47862 47865 404772 CreateEventA CreateThread WaitForSingleObject CloseHandle 47864->47865 47865->47862 47923 414d2d 47865->47923 47866->47862 47868->47844 47869->47843 47870->47851 47872 418960 47871->47872 47903 403b60 47872->47903 47875 418a0c 47876 418a6c 47875->47876 47888 418a11 47875->47888 47877 418ad0 47876->47877 47881 418a71 47876->47881 47878 418b21 47877->47878 47887 418ad5 47877->47887 47879 418b26 mouse_event 47878->47879 47882 418978 47878->47882 47896 418aca 47879->47896 47909 4187cd GetSystemMetrics GetSystemMetrics GetSystemMetrics GetSystemMetrics MulDiv 47881->47909 47884 417c7e 95 API calls 47882->47884 47882->47896 47883 401eea 26 API calls 47885 418b96 47883->47885 47884->47896 47889 401eea 26 API calls 47885->47889 47886 4189b1 47906 418cb4 9 API calls 47886->47906 47911 4187cd GetSystemMetrics GetSystemMetrics GetSystemMetrics GetSystemMetrics MulDiv 47887->47911 47907 4187cd GetSystemMetrics GetSystemMetrics GetSystemMetrics GetSystemMetrics MulDiv 47888->47907 47892 418b9e 47889->47892 47892->47862 47895 418a5a 47908 418ba6 SendInput ___scrt_fastfail 47895->47908 47896->47883 47897 418b11 47912 418c68 SendInput ___scrt_fastfail 47897->47912 47898 418aba 47910 418c07 SendInput ___scrt_fastfail 47898->47910 47902 418a06 47902->47896 47913 403c30 47903->47913 47906->47902 47907->47895 47908->47902 47909->47898 47910->47896 47911->47897 47912->47902 47914 403c39 47913->47914 47917 403c59 47914->47917 47918 403c68 47917->47918 47919 4032a4 28 API calls 47918->47919 47920 403c74 47919->47920 47921 402325 28 API calls 47920->47921 47922 403b73 47921->47922 47922->47875 47922->47882 47922->47886 47924 401fbd 28 API calls 47923->47924 47925 414d4f SetEvent 47924->47925 47926 414d64 47925->47926 47927 403b60 28 API calls 47926->47927 47928 414d7e 47927->47928 47929 401fbd 28 API calls 47928->47929 47930 414d8e 47929->47930 47931 401fbd 28 API calls 47930->47931 47932 414da0 47931->47932 48002 41b1ce 47932->48002 47935 414f1c 48051 401d8c 47935->48051 47936 414dc9 GetTickCount 47938 41af51 28 API calls 47936->47938 47941 414ddf 47938->47941 47939 414f3f 48050 404ab1 83 API calls 47939->48050 47940 4163d6 47943 401eea 26 API calls 47940->47943 48023 41aeab 47941->48023 47946 4163e2 47943->47946 47945 414f0f 47945->47935 47947 401eea 26 API calls 47946->47947 47949 4163ee 47947->47949 47948 414de6 47950 41af51 28 API calls 47948->47950 47951 414df1 47950->47951 48025 41ae5d 47951->48025 47956 401d64 28 API calls 47957 414e1b 47956->47957 47958 4027ec 28 API calls 47957->47958 47959 414e29 47958->47959 47960 40275c 28 API calls 47959->47960 47961 414e38 47960->47961 47962 4027cb 28 API calls 47961->47962 47963 414e47 47962->47963 47964 40275c 28 API calls 47963->47964 47965 414e56 47964->47965 47966 4027cb 28 API calls 47965->47966 47967 414e62 47966->47967 47968 40275c 28 API calls 47967->47968 47969 414e6c 47968->47969 47970 404468 60 API calls 47969->47970 47971 414e7b 47970->47971 47972 401eea 26 API calls 47971->47972 47973 414e84 47972->47973 47974 401eea 26 API calls 47973->47974 47975 414e90 47974->47975 47976 401eea 26 API calls 47975->47976 47977 414e9c 47976->47977 47978 401eea 26 API calls 47977->47978 47979 414ea8 47978->47979 47980 401eea 26 API calls 47979->47980 47981 414eb4 47980->47981 47982 401eea 26 API calls 47981->47982 47983 414ec0 47982->47983 47984 401e13 26 API calls 47983->47984 47985 414ecc 47984->47985 47986 401eea 26 API calls 47985->47986 47987 414ed5 47986->47987 47988 401eea 26 API calls 47987->47988 47989 414ede 47988->47989 47990 401d64 28 API calls 47989->47990 47991 414ee9 47990->47991 47992 43a7f7 _strftime 42 API calls 47991->47992 47993 414ef6 47992->47993 47994 414f21 47993->47994 47995 414efb 47993->47995 47996 401d64 28 API calls 47994->47996 47998 414f14 47995->47998 47999 414f09 47995->47999 47997 414f2b 47996->47997 47997->47935 47997->47939 48035 404915 47998->48035 48034 4049ba 81 API calls 47999->48034 48003 41b1e1 48002->48003 48006 41b253 48003->48006 48009 403b60 28 API calls 48003->48009 48015 401eef 26 API calls 48003->48015 48018 401eea 26 API calls 48003->48018 48022 41b251 48003->48022 48057 41c1b4 28 API calls 48003->48057 48004 401eea 26 API calls 48005 41b283 48004->48005 48007 401eea 26 API calls 48005->48007 48008 403b60 28 API calls 48006->48008 48010 41b28b 48007->48010 48011 41b25f 48008->48011 48009->48003 48012 401eea 26 API calls 48010->48012 48014 401eef 26 API calls 48011->48014 48013 414da9 48012->48013 48013->47935 48013->47936 48013->47997 48016 41b268 48014->48016 48015->48003 48017 401eea 26 API calls 48016->48017 48019 41b270 48017->48019 48018->48003 48058 41c1b4 28 API calls 48019->48058 48022->48004 48024 41aec1 GetTickCount 48023->48024 48024->47948 48026 436260 ___scrt_fastfail 48025->48026 48027 41ae7c GetForegroundWindow GetWindowTextW 48026->48027 48028 403b40 28 API calls 48027->48028 48029 414dff 48028->48029 48030 41b0d3 48029->48030 48031 41b0e0 48030->48031 48032 401f86 28 API calls 48031->48032 48033 414e0d 48032->48033 48033->47956 48034->47945 48036 4049b1 48035->48036 48037 40492a 48035->48037 48036->47935 48038 404933 48037->48038 48039 404987 CreateEventA CreateThread 48037->48039 48040 404942 GetLocalTime 48037->48040 48038->48039 48039->48036 48060 404b1d 48039->48060 48041 41af51 28 API calls 48040->48041 48042 40495b 48041->48042 48059 404c9e 28 API calls 48042->48059 48044 404968 48045 401f66 28 API calls 48044->48045 48046 404977 48045->48046 48047 41a891 79 API calls 48046->48047 48048 40497c 48047->48048 48049 401eea 26 API calls 48048->48049 48049->48039 48050->47945 48052 40200a 48051->48052 48056 40203a 48052->48056 48064 402654 26 API calls 48052->48064 48054 40202b 48065 4026ba 26 API calls _Deallocate 48054->48065 48056->47940 48057->48003 48058->48022 48059->48044 48063 404b29 101 API calls 48060->48063 48062 404b26 48063->48062 48064->48054 48065->48056 48066->47720 48067->47725 48068->47727 48070 440e6a 48069->48070 48073 440c5a 48070->48073 48074 440c71 48073->48074 48078 41af72 48074->48078 48079 445564 20 API calls _free 48074->48079 48076 440ca8 48080 43aa37 26 API calls _Deallocate 48076->48080 48078->47732 48079->48076 48080->48078 48081 415e43 48082 401d64 28 API calls 48081->48082 48083 415e4e 48082->48083 48084 401d64 28 API calls 48083->48084 48085 415e67 48084->48085 48086 401fbd 28 API calls 48085->48086 48087 415e72 48086->48087 48096 41661c 48087->48096 48090 401d8c 26 API calls 48091 4163d6 48090->48091 48092 401eea 26 API calls 48091->48092 48093 4163e2 48092->48093 48094 401eea 26 API calls 48093->48094 48095 4163ee 48094->48095 48097 416632 48096->48097 48098 4167d4 48096->48098 48130 4040bb 48097->48130 48100 401eea 26 API calls 48098->48100 48101 415e85 48100->48101 48101->48090 48103 40428c 96 API calls 48104 41664e 48103->48104 48105 4167c6 48104->48105 48106 41b0d3 28 API calls 48104->48106 48137 4048a6 98 API calls 48105->48137 48108 416668 48106->48108 48109 4027ec 28 API calls 48108->48109 48110 416679 48109->48110 48111 40275c 28 API calls 48110->48111 48112 416683 48111->48112 48113 404468 60 API calls 48112->48113 48114 416694 48113->48114 48115 401eea 26 API calls 48114->48115 48116 41669c 48115->48116 48117 401eea 26 API calls 48116->48117 48125 4166a4 48117->48125 48120 41ae5d 30 API calls 48120->48125 48121 41b0d3 28 API calls 48121->48125 48122 401f86 28 API calls 48122->48125 48123 40275c 28 API calls 48123->48125 48124 404468 60 API calls 48124->48125 48125->48120 48125->48121 48125->48122 48125->48123 48125->48124 48126 401eea 26 API calls 48125->48126 48127 401e13 26 API calls 48125->48127 48128 4167bb 48125->48128 48134 41ab17 GlobalMemoryStatusEx 48125->48134 48135 41ab95 GetSystemTimes Sleep GetSystemTimes 48125->48135 48126->48125 48127->48125 48129 4047eb 98 API calls 48128->48129 48129->48105 48131 4040cb 48130->48131 48132 4040fa 48131->48132 48133 4041f1 3 API calls 48131->48133 48132->48103 48133->48132 48134->48125 48136 41abda __aulldiv 48135->48136 48136->48125 48138 447153 GetLastError 48139 44716c 48138->48139 48140 447172 48138->48140 48164 447676 11 API calls 2 library calls 48139->48164 48144 4471c9 SetLastError 48140->48144 48157 448916 48140->48157 48146 4471d2 48144->48146 48145 44718c 48165 446cd5 48145->48165 48149 4471a1 48149->48145 48151 4471a8 48149->48151 48150 447192 48152 4471c0 SetLastError 48150->48152 48172 446f41 20 API calls __Tolower 48151->48172 48152->48146 48154 4471b3 48155 446cd5 _free 17 API calls 48154->48155 48156 4471b9 48155->48156 48156->48144 48156->48152 48163 448923 _strftime 48157->48163 48158 448963 48174 445564 20 API calls _free 48158->48174 48159 44894e RtlAllocateHeap 48161 447184 48159->48161 48159->48163 48161->48145 48171 4476cc 11 API calls 2 library calls 48161->48171 48163->48158 48163->48159 48173 442410 7 API calls 2 library calls 48163->48173 48164->48140 48166 446ce0 RtlFreeHeap 48165->48166 48167 446d09 _free 48165->48167 48166->48167 48168 446cf5 48166->48168 48167->48150 48175 445564 20 API calls _free 48168->48175 48170 446cfb GetLastError 48170->48167 48171->48149 48172->48154 48173->48163 48174->48161 48175->48170 48176 433bc9 48177 433bd5 ___DestructExceptionObject 48176->48177 48208 4338be 48177->48208 48179 433bdc 48180 433d2f 48179->48180 48184 433c06 48179->48184 48510 433d4f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 48180->48510 48182 433d36 48511 4428ce 28 API calls _Atexit 48182->48511 48194 433c45 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 48184->48194 48504 4436e1 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48184->48504 48185 433d3c 48512 442880 28 API calls _Atexit 48185->48512 48188 433c1f 48190 433c25 48188->48190 48505 443685 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 48188->48505 48189 433d44 48192 433ca6 48219 433e69 48192->48219 48194->48192 48506 43f037 38 API calls 4 library calls 48194->48506 48202 433cc8 48202->48182 48203 433ccc 48202->48203 48204 433cd5 48203->48204 48508 442871 28 API calls _Atexit 48203->48508 48509 433a4d 13 API calls 2 library calls 48204->48509 48207 433cdd 48207->48190 48209 4338c7 48208->48209 48513 434015 IsProcessorFeaturePresent 48209->48513 48211 4338d3 48514 437bfe 10 API calls 3 library calls 48211->48514 48213 4338d8 48214 4338dc 48213->48214 48515 44356e 48213->48515 48214->48179 48217 4338f3 48217->48179 48220 436260 ___scrt_fastfail 48219->48220 48221 433e7c GetStartupInfoW 48220->48221 48222 433cac 48221->48222 48223 443632 48222->48223 48531 44dfd9 48223->48531 48225 44363b 48226 433cb5 48225->48226 48535 44e2e3 38 API calls 48225->48535 48228 40d83a 48226->48228 48537 41beee LoadLibraryA GetProcAddress 48228->48537 48230 40d856 GetModuleFileNameW 48542 40e240 48230->48542 48232 40d872 48233 401fbd 28 API calls 48232->48233 48234 40d881 48233->48234 48235 401fbd 28 API calls 48234->48235 48236 40d890 48235->48236 48237 41b1ce 28 API calls 48236->48237 48238 40d899 48237->48238 48557 40e995 48238->48557 48240 40d8a2 48241 401d8c 26 API calls 48240->48241 48242 40d8ab 48241->48242 48243 40d908 48242->48243 48244 40d8be 48242->48244 48246 401d64 28 API calls 48243->48246 48761 40ea5e 111 API calls 48244->48761 48248 40d918 48246->48248 48247 40d8d0 48249 401d64 28 API calls 48247->48249 48250 401d64 28 API calls 48248->48250 48253 40d8dc 48249->48253 48251 40d937 48250->48251 48252 404cbf 28 API calls 48251->48252 48254 40d946 48252->48254 48762 40ea0f 68 API calls 48253->48762 48255 405ce6 28 API calls 48254->48255 48257 40d952 48255->48257 48259 401eef 26 API calls 48257->48259 48258 40d8f7 48763 40e22d 68 API calls 48258->48763 48261 40d95e 48259->48261 48262 401eea 26 API calls 48261->48262 48263 40d967 48262->48263 48265 401eea 26 API calls 48263->48265 48264 401eea 26 API calls 48266 40dd72 48264->48266 48267 40d970 48265->48267 48507 433e9f GetModuleHandleW 48266->48507 48268 401d64 28 API calls 48267->48268 48269 40d979 48268->48269 48270 401ebd 28 API calls 48269->48270 48271 40d984 48270->48271 48272 401d64 28 API calls 48271->48272 48273 40d99d 48272->48273 48274 401d64 28 API calls 48273->48274 48275 40d9b8 48274->48275 48276 40da19 48275->48276 48764 4085b4 48275->48764 48277 401d64 28 API calls 48276->48277 48292 40e20c 48276->48292 48283 40da30 48277->48283 48279 40d9e5 48280 401eef 26 API calls 48279->48280 48281 40d9f1 48280->48281 48282 401eea 26 API calls 48281->48282 48285 40d9fa 48282->48285 48284 40da77 48283->48284 48289 41258f 3 API calls 48283->48289 48561 40bed7 48284->48561 48768 41258f RegOpenKeyExA 48285->48768 48287 40da7d 48288 40d900 48287->48288 48564 41a66e 48287->48564 48288->48264 48294 40da5b 48289->48294 48846 4129da 30 API calls 48292->48846 48293 40da98 48295 40daeb 48293->48295 48581 40697b 48293->48581 48294->48284 48771 4129da 30 API calls 48294->48771 48297 401d64 28 API calls 48295->48297 48300 40daf4 48297->48300 48309 40db00 48300->48309 48310 40db05 48300->48310 48302 40e222 48847 41138d 64 API calls ___scrt_fastfail 48302->48847 48303 40dac1 48307 401d64 28 API calls 48303->48307 48304 40dab7 48772 40699d 30 API calls 48304->48772 48316 40daca 48307->48316 48775 4069ba CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 48309->48775 48314 401d64 28 API calls 48310->48314 48311 40dabc 48773 4064d0 97 API calls 48311->48773 48315 40db0e 48314->48315 48585 41b013 48315->48585 48316->48295 48320 40dae6 48316->48320 48318 40db19 48319 401e18 26 API calls 48318->48319 48321 40db24 48319->48321 48774 4064d0 97 API calls 48320->48774 48323 401e13 26 API calls 48321->48323 48324 40db2d 48323->48324 48325 401d64 28 API calls 48324->48325 48326 40db36 48325->48326 48327 401d64 28 API calls 48326->48327 48328 40db50 48327->48328 48329 401d64 28 API calls 48328->48329 48330 40db6a 48329->48330 48331 401d64 28 API calls 48330->48331 48333 40db83 48331->48333 48332 40dbf0 48335 40dbff 48332->48335 48341 40dd7d ___scrt_fastfail 48332->48341 48333->48332 48334 401d64 28 API calls 48333->48334 48339 40db98 _wcslen 48334->48339 48336 40dc08 48335->48336 48364 40dc84 ___scrt_fastfail 48335->48364 48337 401d64 28 API calls 48336->48337 48338 40dc11 48337->48338 48340 401d64 28 API calls 48338->48340 48339->48332 48343 401d64 28 API calls 48339->48343 48342 40dc23 48340->48342 48835 412735 RegOpenKeyExA 48341->48835 48346 401d64 28 API calls 48342->48346 48344 40dbb3 48343->48344 48347 401d64 28 API calls 48344->48347 48348 40dc35 48346->48348 48349 40dbc8 48347->48349 48351 401d64 28 API calls 48348->48351 48776 40c89e 48349->48776 48350 40ddc2 48352 401d64 28 API calls 48350->48352 48354 40dc5e 48351->48354 48355 40dde9 48352->48355 48360 401d64 28 API calls 48354->48360 48358 401f66 28 API calls 48355->48358 48357 401e18 26 API calls 48359 40dbe7 48357->48359 48361 40ddf8 48358->48361 48362 401e13 26 API calls 48359->48362 48363 40dc6f 48360->48363 48599 4127aa RegCreateKeyA 48361->48599 48362->48332 48833 40bc67 45 API calls _wcslen 48363->48833 48589 41297a 48364->48589 48368 40dc7f 48368->48364 48370 40dd18 48373 401d64 28 API calls 48370->48373 48371 401d64 28 API calls 48372 40de1a 48371->48372 48375 43a7f7 _strftime 42 API calls 48372->48375 48374 40dd2f 48373->48374 48374->48350 48377 40dd43 48374->48377 48376 40de27 48375->48376 48378 40de31 48376->48378 48379 40de54 48376->48379 48380 401d64 28 API calls 48377->48380 48838 41c0bb 86 API calls ___scrt_fastfail 48378->48838 48384 401f66 28 API calls 48379->48384 48381 40dd51 48380->48381 48385 41b013 28 API calls 48381->48385 48383 40de38 CreateThread 48383->48379 49213 41cb7a 10 API calls 48383->49213 48386 40de69 48384->48386 48387 40dd5a 48385->48387 48388 401f66 28 API calls 48386->48388 48834 40e2f1 109 API calls 48387->48834 48390 40de78 48388->48390 48392 41a891 79 API calls 48390->48392 48391 40dd5f 48391->48350 48393 40dd66 48391->48393 48394 40de7d 48392->48394 48393->48288 48395 401d64 28 API calls 48394->48395 48396 40de89 48395->48396 48397 401d64 28 API calls 48396->48397 48398 40de9e 48397->48398 48399 401d64 28 API calls 48398->48399 48400 40debe 48399->48400 48401 43a7f7 _strftime 42 API calls 48400->48401 48402 40decb 48401->48402 48403 401d64 28 API calls 48402->48403 48404 40ded6 48403->48404 48405 401d64 28 API calls 48404->48405 48406 40dee7 48405->48406 48407 401d64 28 API calls 48406->48407 48408 40defc 48407->48408 48409 401d64 28 API calls 48408->48409 48410 40df0d 48409->48410 48411 40df14 StrToIntA 48410->48411 48605 409517 48411->48605 48414 401d64 28 API calls 48415 40df2f 48414->48415 48416 40df74 48415->48416 48417 40df3b 48415->48417 48420 401d64 28 API calls 48416->48420 48839 433818 22 API calls 3 library calls 48417->48839 48419 40df44 48421 401d64 28 API calls 48419->48421 48422 40df84 48420->48422 48423 40df57 48421->48423 48425 40df90 48422->48425 48426 40dfcc 48422->48426 48424 40df5e CreateThread 48423->48424 48424->48416 49211 41931e 102 API calls 2 library calls 48424->49211 48840 433818 22 API calls 3 library calls 48425->48840 48427 401d64 28 API calls 48426->48427 48429 40dfd5 48427->48429 48433 40dfe1 48429->48433 48434 40e03f 48429->48434 48430 40df99 48431 401d64 28 API calls 48430->48431 48432 40dfab 48431->48432 48435 40dfb2 CreateThread 48432->48435 48437 401d64 28 API calls 48433->48437 48436 401d64 28 API calls 48434->48436 48435->48426 49210 41931e 102 API calls 2 library calls 48435->49210 48438 40e048 48436->48438 48439 40dff1 48437->48439 48440 40e054 48438->48440 48441 40e08d 48438->48441 48442 401d64 28 API calls 48439->48442 48444 401d64 28 API calls 48440->48444 48630 41a9ad GetComputerNameExW GetUserNameW 48441->48630 48445 40e006 48442->48445 48447 40e05d 48444->48447 48841 40c854 31 API calls 48445->48841 48451 401d64 28 API calls 48447->48451 48448 401e18 26 API calls 48450 40e0a1 48448->48450 48453 401e13 26 API calls 48450->48453 48454 40e072 48451->48454 48452 40e019 48455 401e18 26 API calls 48452->48455 48456 40e0aa 48453->48456 48465 43a7f7 _strftime 42 API calls 48454->48465 48457 40e025 48455->48457 48458 40e0b3 SetProcessDEPPolicy 48456->48458 48459 40e0b6 CreateThread 48456->48459 48462 401e13 26 API calls 48457->48462 48458->48459 48460 40e0d7 48459->48460 48461 40e0cb CreateThread 48459->48461 49182 40e627 48459->49182 48463 40e0e0 CreateThread 48460->48463 48464 40e0ec 48460->48464 48461->48460 49212 41100e 137 API calls 48461->49212 48466 40e02e CreateThread 48462->48466 48463->48464 49214 4115fc 38 API calls ___scrt_fastfail 48463->49214 48468 40e146 48464->48468 48470 401f66 28 API calls 48464->48470 48467 40e07f 48465->48467 48466->48434 49209 40196b 49 API calls _strftime 48466->49209 48842 40b95c 7 API calls 48467->48842 48641 412546 RegOpenKeyExA 48468->48641 48471 40e119 48470->48471 48843 404c9e 28 API calls 48471->48843 48475 40e126 48477 401f66 28 API calls 48475->48477 48476 40e1fd 48653 40cbac 48476->48653 48480 40e135 48477->48480 48479 41b013 28 API calls 48482 40e177 48479->48482 48483 41a891 79 API calls 48480->48483 48644 41265c RegOpenKeyExW 48482->48644 48484 40e13a 48483->48484 48486 401eea 26 API calls 48484->48486 48486->48468 48491 401e13 26 API calls 48494 40e198 48491->48494 48492 40e1c0 DeleteFileW 48493 40e1c7 48492->48493 48492->48494 48496 41b013 28 API calls 48493->48496 48494->48492 48494->48493 48495 40e1ae Sleep 48494->48495 48844 401e07 48495->48844 48498 40e1d7 48496->48498 48649 412a52 RegOpenKeyExW 48498->48649 48500 40e1ea 48501 401e13 26 API calls 48500->48501 48502 40e1f4 48501->48502 48503 401e13 26 API calls 48502->48503 48503->48476 48504->48188 48505->48194 48506->48192 48507->48202 48508->48204 48509->48207 48510->48182 48511->48185 48512->48189 48513->48211 48514->48213 48519 44eb59 48515->48519 48518 437c27 8 API calls 3 library calls 48518->48214 48520 44eb72 48519->48520 48523 433f37 48520->48523 48522 4338e5 48522->48217 48522->48518 48524 433f42 IsProcessorFeaturePresent 48523->48524 48525 433f40 48523->48525 48527 4343b4 48524->48527 48525->48522 48530 434378 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 48527->48530 48529 434497 48529->48522 48530->48529 48532 44dfe2 48531->48532 48534 44dfeb 48531->48534 48536 44ded8 51 API calls 3 library calls 48532->48536 48534->48225 48535->48225 48536->48534 48538 41bf2d LoadLibraryA GetProcAddress 48537->48538 48539 41bf1d GetModuleHandleA GetProcAddress 48537->48539 48540 41bf56 32 API calls 48538->48540 48541 41bf46 LoadLibraryA GetProcAddress 48538->48541 48539->48538 48540->48230 48541->48540 48848 41a84a FindResourceA 48542->48848 48545 43aa9c _Yarn 21 API calls 48546 40e26a _Yarn 48545->48546 48547 401f86 28 API calls 48546->48547 48548 40e285 48547->48548 48549 401eef 26 API calls 48548->48549 48550 40e290 48549->48550 48551 401eea 26 API calls 48550->48551 48552 40e299 48551->48552 48553 43aa9c _Yarn 21 API calls 48552->48553 48554 40e2aa _Yarn 48553->48554 48851 406052 48554->48851 48556 40e2dd 48556->48232 48558 40e9a2 48557->48558 48559 40e9b2 48558->48559 48854 40200a 26 API calls 48558->48854 48559->48240 48855 401e8f 48561->48855 48563 40bee1 CreateMutexA GetLastError 48563->48287 48857 41b366 48564->48857 48569 401eef 26 API calls 48570 41a6aa 48569->48570 48571 401eea 26 API calls 48570->48571 48573 41a6b2 48571->48573 48572 41a705 48572->48293 48573->48572 48574 4125eb 31 API calls 48573->48574 48575 41a6d8 48574->48575 48576 41a6e3 StrToIntA 48575->48576 48577 41a6f1 48576->48577 48578 41a6fa 48576->48578 48865 41c30d 28 API calls 48577->48865 48580 401eea 26 API calls 48578->48580 48580->48572 48582 40698f 48581->48582 48583 41258f 3 API calls 48582->48583 48584 406996 48583->48584 48584->48303 48584->48304 48586 41b027 48585->48586 48866 40b027 48586->48866 48588 41b02f 48588->48318 48590 412998 48589->48590 48591 406052 28 API calls 48590->48591 48592 4129ad 48591->48592 48593 401fbd 28 API calls 48592->48593 48594 4129bd 48593->48594 48595 4127aa 29 API calls 48594->48595 48596 4129c7 48595->48596 48597 401eea 26 API calls 48596->48597 48598 4129d4 48597->48598 48598->48370 48600 4127fa 48599->48600 48603 4127c3 48599->48603 48601 401eea 26 API calls 48600->48601 48602 40de0e 48601->48602 48602->48371 48604 4127d5 RegSetValueExA RegCloseKey 48603->48604 48604->48600 48606 409536 _wcslen 48605->48606 48607 409541 48606->48607 48608 409558 48606->48608 48610 40c89e 31 API calls 48607->48610 48609 40c89e 31 API calls 48608->48609 48612 409560 48609->48612 48611 409549 48610->48611 48613 401e18 26 API calls 48611->48613 48614 401e18 26 API calls 48612->48614 48615 409553 48613->48615 48616 40956e 48614->48616 48618 401e13 26 API calls 48615->48618 48617 401e13 26 API calls 48616->48617 48619 409576 48617->48619 48620 4095ad 48618->48620 48890 40856b 28 API calls 48619->48890 48875 409837 48620->48875 48623 409588 48625 4028cf 28 API calls 48623->48625 48626 409593 48625->48626 48627 401e18 26 API calls 48626->48627 48628 40959d 48627->48628 48629 401e13 26 API calls 48628->48629 48629->48615 48631 403b40 28 API calls 48630->48631 48632 41a9fc 48631->48632 49036 403cbb 48632->49036 48634 41aa08 48635 4028cf 28 API calls 48634->48635 48636 41aa12 48635->48636 48637 401e13 26 API calls 48636->48637 48638 41aa1b 48637->48638 48639 401e13 26 API calls 48638->48639 48640 40e096 48639->48640 48640->48448 48642 412567 RegQueryValueExA RegCloseKey 48641->48642 48643 40e15e 48641->48643 48642->48643 48643->48476 48643->48479 48645 4126b5 48644->48645 48646 412688 RegQueryValueExW RegCloseKey 48644->48646 48647 403b40 28 API calls 48645->48647 48646->48645 48648 40e18d 48647->48648 48648->48491 48650 412a6a RegDeleteValueW 48649->48650 48651 412a7e 48649->48651 48650->48651 48652 412a7a 48650->48652 48651->48500 48652->48500 48654 40cbc5 48653->48654 48655 412546 3 API calls 48654->48655 48656 40cbcc 48655->48656 48657 40cbeb 48656->48657 49050 401602 48656->49050 48661 40cc37 48657->48661 48659 40cbd9 49053 4128ad RegCreateKeyA 48659->49053 48662 40cc4b 48661->48662 48663 412546 3 API calls 48662->48663 48664 40cc52 48663->48664 48665 40cc81 48664->48665 48666 40cc57 48664->48666 48670 41258f 3 API calls 48665->48670 48667 401602 27 API calls 48666->48667 48668 40cc5e 48667->48668 49070 43eadd 48668->49070 48672 40cc7f 48670->48672 48676 4140ac 48672->48676 48674 40cc6a 48675 4128ad 3 API calls 48674->48675 48675->48672 48677 4140c3 48676->48677 49105 41ac7e 48677->49105 48679 4140ce 48680 401d64 28 API calls 48679->48680 48681 4140e7 48680->48681 48682 43a7f7 _strftime 42 API calls 48681->48682 48683 4140f4 48682->48683 48684 414106 48683->48684 48685 4140f9 Sleep 48683->48685 48686 401f66 28 API calls 48684->48686 48685->48684 48687 414115 48686->48687 48688 401d64 28 API calls 48687->48688 48689 414123 48688->48689 48690 401fbd 28 API calls 48689->48690 48691 41412b 48690->48691 48692 41b1ce 28 API calls 48691->48692 48693 414133 48692->48693 49109 404262 WSAStartup 48693->49109 48695 41413d 48696 401d64 28 API calls 48695->48696 48697 414146 48696->48697 48698 401d64 28 API calls 48697->48698 48720 4141c5 48697->48720 48699 41415f 48698->48699 48700 401d64 28 API calls 48699->48700 48701 414170 48700->48701 48703 401d64 28 API calls 48701->48703 48702 41b1ce 28 API calls 48702->48720 48704 414181 48703->48704 48706 401d64 28 API calls 48704->48706 48705 4085b4 28 API calls 48705->48720 48707 414192 48706->48707 48708 401d64 28 API calls 48707->48708 48710 4141a3 48708->48710 48709 401eef 26 API calls 48709->48720 48711 401d64 28 API calls 48710->48711 48712 4141b5 48711->48712 49136 404101 87 API calls 48712->49136 48715 41431c WSAGetLastError 49137 41be81 30 API calls 48715->49137 48717 4041f1 3 API calls 48717->48720 48719 404915 104 API calls 48719->48720 48720->48702 48720->48705 48720->48709 48720->48715 48720->48717 48720->48719 48721 40428c 96 API calls 48720->48721 48722 4047eb 98 API calls 48720->48722 48723 404cbf 28 API calls 48720->48723 48725 401d8c 26 API calls 48720->48725 48726 414c76 48720->48726 48729 401eea 26 API calls 48720->48729 48732 4082dc 28 API calls 48720->48732 48733 440e5e 26 API calls 48720->48733 48734 401d64 28 API calls 48720->48734 48735 401fbd 28 API calls 48720->48735 48736 412735 3 API calls 48720->48736 48737 4125eb 31 API calls 48720->48737 48738 403b40 28 API calls 48720->48738 48741 41aff9 28 API calls 48720->48741 48742 41b0d3 28 API calls 48720->48742 48743 41af51 28 API calls 48720->48743 48744 401d64 28 API calls 48720->48744 48747 41aeab GetTickCount 48720->48747 48748 41ae5d 30 API calls 48720->48748 48750 4027ec 28 API calls 48720->48750 48751 405ce6 28 API calls 48720->48751 48752 4027cb 28 API calls 48720->48752 48753 40275c 28 API calls 48720->48753 48754 404468 60 API calls 48720->48754 48755 401e13 26 API calls 48720->48755 48756 4045d5 181 API calls 48720->48756 48758 401f66 28 API calls 48720->48758 48759 41a891 79 API calls 48720->48759 48760 414cb4 CreateThread 48720->48760 49110 414072 48720->49110 49115 41ab78 48720->49115 49118 41375b 48720->49118 49121 40cc9a 48720->49121 49127 40cbf1 48720->49127 49133 40e751 GetLocaleInfoA 48720->49133 49138 404c9e 28 API calls 48720->49138 48721->48720 48722->48720 48723->48720 48724 401d64 28 API calls 48724->48726 48725->48720 48726->48724 48727 43a7f7 _strftime 42 API calls 48726->48727 49139 40a767 84 API calls 48726->49139 48728 414d12 Sleep 48727->48728 48728->48720 48729->48720 48732->48720 48733->48720 48734->48720 48735->48720 48736->48720 48737->48720 48738->48720 48741->48720 48742->48720 48743->48720 48745 4145fa GetTickCount 48744->48745 48746 41af51 28 API calls 48745->48746 48746->48720 48747->48720 48748->48720 48750->48720 48751->48720 48752->48720 48753->48720 48754->48720 48755->48720 48756->48720 48758->48720 48759->48720 48760->48720 49175 41a07f 103 API calls 48760->49175 48761->48247 48762->48258 48765 4085c0 48764->48765 48766 402e78 28 API calls 48765->48766 48767 4085e4 48766->48767 48767->48279 48769 4125e3 48768->48769 48770 4125b9 RegQueryValueExA RegCloseKey 48768->48770 48769->48276 48770->48769 48771->48284 48772->48311 48773->48303 48774->48295 48775->48310 48777 40c8ba 48776->48777 48778 40c8d0 48777->48778 48779 40c8da 48777->48779 48780 40c90f 48777->48780 48782 40ca03 GetLongPathNameW 48778->48782 49176 41a956 29 API calls 48779->49176 48783 41b366 GetCurrentProcess 48780->48783 48785 403b40 28 API calls 48782->48785 48786 40c914 48783->48786 48784 40c8e3 48787 401e18 26 API calls 48784->48787 48788 40ca18 48785->48788 48789 40c918 48786->48789 48790 40c96a 48786->48790 48792 40c8ed 48787->48792 48793 403b40 28 API calls 48788->48793 48791 403b40 28 API calls 48789->48791 48794 403b40 28 API calls 48790->48794 48796 40c926 48791->48796 48798 401e13 26 API calls 48792->48798 48797 40ca27 48793->48797 48795 40c978 48794->48795 48802 403b40 28 API calls 48795->48802 48803 403b40 28 API calls 48796->48803 49179 40cd0a 28 API calls 48797->49179 48798->48778 48800 40ca3a 49180 402860 28 API calls 48800->49180 48805 40c98e 48802->48805 48806 40c93c 48803->48806 48804 40ca45 49181 402860 28 API calls 48804->49181 49178 402860 28 API calls 48805->49178 49177 402860 28 API calls 48806->49177 48810 40ca4f 48813 401e13 26 API calls 48810->48813 48811 40c999 48814 401e18 26 API calls 48811->48814 48812 40c947 48815 401e18 26 API calls 48812->48815 48816 40ca59 48813->48816 48817 40c9a4 48814->48817 48818 40c952 48815->48818 48819 401e13 26 API calls 48816->48819 48820 401e13 26 API calls 48817->48820 48821 401e13 26 API calls 48818->48821 48822 40ca62 48819->48822 48823 40c9ad 48820->48823 48824 40c95b 48821->48824 48825 401e13 26 API calls 48822->48825 48826 401e13 26 API calls 48823->48826 48827 401e13 26 API calls 48824->48827 48828 40ca6b 48825->48828 48826->48792 48827->48792 48829 401e13 26 API calls 48828->48829 48830 40ca74 48829->48830 48831 401e13 26 API calls 48830->48831 48832 40ca7d 48831->48832 48832->48357 48833->48368 48834->48391 48836 41275b RegQueryValueExA RegCloseKey 48835->48836 48837 41277f 48835->48837 48836->48837 48837->48350 48838->48383 48839->48419 48840->48430 48841->48452 48842->48441 48843->48475 48845 401e0c 48844->48845 48846->48302 48849 41a867 LoadResource LockResource SizeofResource 48848->48849 48850 40e25b 48848->48850 48849->48850 48850->48545 48852 401f86 28 API calls 48851->48852 48853 406066 48852->48853 48853->48556 48854->48559 48856 401e94 48855->48856 48858 41b373 GetCurrentProcess 48857->48858 48859 41a67c 48857->48859 48858->48859 48860 4125eb RegOpenKeyExA 48859->48860 48861 412619 RegQueryValueExA RegCloseKey 48860->48861 48862 412641 48860->48862 48861->48862 48863 401f66 28 API calls 48862->48863 48864 412656 48863->48864 48864->48569 48865->48578 48867 40b02f 48866->48867 48870 40b04b 48867->48870 48869 40b045 48869->48588 48871 40b055 48870->48871 48873 40b060 48871->48873 48874 40b138 28 API calls 48871->48874 48873->48869 48874->48873 48876 409855 48875->48876 48877 41258f 3 API calls 48876->48877 48878 40985c 48877->48878 48879 409870 48878->48879 48880 40988a 48878->48880 48881 4095cf 48879->48881 48882 409875 48879->48882 48891 4082dc 48880->48891 48881->48414 48885 4082dc 28 API calls 48882->48885 48887 409883 48885->48887 48917 409959 29 API calls 48887->48917 48889 409888 48889->48881 48890->48623 48892 4082eb 48891->48892 48918 408431 48892->48918 48894 408309 48895 4098a5 48894->48895 48923 40affa 48895->48923 48898 4098f6 48900 401f66 28 API calls 48898->48900 48899 4098ce 48901 401f66 28 API calls 48899->48901 48902 409901 48900->48902 48903 4098d8 48901->48903 48905 401f66 28 API calls 48902->48905 48904 41b013 28 API calls 48903->48904 48906 4098e6 48904->48906 48907 409910 48905->48907 48927 40a876 31 API calls _Yarn 48906->48927 48909 41a891 79 API calls 48907->48909 48911 409915 CreateThread 48909->48911 48910 4098ed 48912 401eea 26 API calls 48910->48912 48913 409930 CreateThread 48911->48913 48914 40993c CreateThread 48911->48914 48928 4099a9 48911->48928 48912->48898 48913->48914 48934 409993 48913->48934 48915 401e13 26 API calls 48914->48915 48931 4099b5 48914->48931 48916 409950 48915->48916 48916->48881 48917->48889 49035 40999f 135 API calls 48917->49035 48919 40843d 48918->48919 48921 40845b 48919->48921 48922 402f0d 28 API calls 48919->48922 48921->48894 48922->48921 48925 40b006 48923->48925 48924 4098c3 48924->48898 48924->48899 48925->48924 48926 403b9e 28 API calls 48925->48926 48926->48924 48927->48910 48937 409e48 48928->48937 48982 40a3f4 48931->48982 49019 4099e4 48934->49019 48938 409e5d Sleep 48937->48938 48957 409d97 48938->48957 48940 4099b2 48941 409e9d CreateDirectoryW 48946 409e6f 48941->48946 48942 409eae GetFileAttributesW 48942->48946 48943 401d64 28 API calls 48943->48946 48944 409ec5 SetFileAttributesW 48944->48946 48946->48938 48946->48940 48946->48941 48946->48942 48946->48943 48946->48944 48955 409f10 48946->48955 48970 41b79a 48946->48970 48947 409f3f PathFileExistsW 48947->48955 48949 401f86 28 API calls 48949->48955 48950 40a048 SetFileAttributesW 48950->48946 48951 401eef 26 API calls 48951->48955 48952 406052 28 API calls 48952->48955 48953 401eea 26 API calls 48953->48955 48955->48947 48955->48949 48955->48950 48955->48951 48955->48952 48955->48953 48956 401eea 26 API calls 48955->48956 48979 41b825 32 API calls 48955->48979 48980 41b892 CreateFileW SetFilePointer WriteFile CloseHandle 48955->48980 48956->48946 48958 409e44 48957->48958 48959 409dad 48957->48959 48958->48946 48960 409dcc CreateFileW 48959->48960 48962 409e0f CloseHandle 48959->48962 48963 409e21 48959->48963 48964 409e04 Sleep 48959->48964 48965 409dfd 48959->48965 48960->48959 48961 409dda GetFileSize 48960->48961 48961->48959 48961->48962 48962->48959 48963->48958 48967 4082dc 28 API calls 48963->48967 48964->48962 48981 40a7f0 83 API calls 48965->48981 48968 409e3d 48967->48968 48969 4098a5 126 API calls 48968->48969 48969->48958 48971 41b7ad CreateFileW 48970->48971 48973 41b7e6 48971->48973 48974 41b7ea 48971->48974 48973->48946 48975 41b801 WriteFile 48974->48975 48976 41b7f1 SetFilePointer 48974->48976 48977 41b814 48975->48977 48978 41b816 CloseHandle 48975->48978 48976->48975 48976->48978 48977->48978 48978->48973 48979->48955 48980->48955 48981->48964 49010 40a402 48982->49010 48983 4099be 48984 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 48985 40b027 28 API calls 48984->48985 48985->49010 48988 41aeab GetTickCount 48988->49010 48990 40a4a2 GetWindowTextW 48990->49010 48992 401e13 26 API calls 48992->49010 48993 40a5ff 48995 401e13 26 API calls 48993->48995 48994 40affa 28 API calls 48994->49010 48995->48983 48996 40a569 Sleep 48996->49010 48997 440e5e 26 API calls 48997->49010 48999 401f66 28 API calls 48999->49010 49000 40a4f1 49002 4082dc 28 API calls 49000->49002 49000->49010 49015 40a876 31 API calls _Yarn 49000->49015 49002->49000 49004 405ce6 28 API calls 49004->49010 49006 4028cf 28 API calls 49006->49010 49007 41b013 28 API calls 49007->49010 49008 409d58 27 API calls 49008->49010 49009 401eea 26 API calls 49009->49010 49010->48983 49010->48984 49010->48988 49010->48990 49010->48992 49010->48993 49010->48994 49010->48996 49010->48997 49010->48999 49010->49000 49010->49004 49010->49006 49010->49007 49010->49008 49010->49009 49011 433724 5 API calls __Init_thread_wait 49010->49011 49012 433ab0 29 API calls __onexit 49010->49012 49013 4336da EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 49010->49013 49014 4082a8 28 API calls 49010->49014 49016 40b0dd 28 API calls 49010->49016 49017 40ae58 44 API calls 2 library calls 49010->49017 49018 404c9e 28 API calls 49010->49018 49011->49010 49012->49010 49013->49010 49014->49010 49015->49000 49016->49010 49017->49010 49018->49010 49020 409a63 GetMessageA 49019->49020 49021 4099ff GetModuleHandleA SetWindowsHookExA 49019->49021 49022 409a75 TranslateMessage DispatchMessageA 49020->49022 49033 40999c 49020->49033 49021->49020 49023 409a1b GetLastError 49021->49023 49022->49020 49022->49033 49024 41af51 28 API calls 49023->49024 49025 409a31 49024->49025 49034 404c9e 28 API calls 49025->49034 49027 409a3e 49028 401f66 28 API calls 49027->49028 49029 409a4d 49028->49029 49030 41a891 79 API calls 49029->49030 49031 409a52 49030->49031 49032 401eea 26 API calls 49031->49032 49032->49033 49034->49027 49039 403dc2 49036->49039 49038 403cc9 49038->48634 49040 403dce 49039->49040 49043 402ffd 49040->49043 49042 403de3 49042->49038 49044 40300e 49043->49044 49045 4032a4 28 API calls 49044->49045 49046 40301a 49045->49046 49048 40302e 49046->49048 49049 4035e8 28 API calls 49046->49049 49048->49042 49049->49048 49056 4397ca 49050->49056 49054 4128ec 49053->49054 49055 4128c5 RegSetValueExA RegCloseKey 49053->49055 49054->48657 49055->49054 49059 43974b 49056->49059 49058 401608 49058->48659 49060 43975a 49059->49060 49061 43976e 49059->49061 49067 445564 20 API calls _free 49060->49067 49066 43976a __alldvrm 49061->49066 49069 447811 11 API calls 2 library calls 49061->49069 49063 43975f 49068 43aa37 26 API calls _Deallocate 49063->49068 49066->49058 49067->49063 49068->49066 49069->49066 49078 4470cf GetLastError 49070->49078 49072 40cc64 49073 41a659 49072->49073 49102 43eabc 49073->49102 49076 43eabc 38 API calls 49077 41a66a 49076->49077 49077->48674 49079 4470e5 49078->49079 49080 4470eb 49078->49080 49098 447676 11 API calls 2 library calls 49079->49098 49082 448916 std::_Locinfo::_Locinfo_dtor 20 API calls 49080->49082 49084 44713a SetLastError 49080->49084 49083 4470fd 49082->49083 49085 447105 49083->49085 49099 4476cc 11 API calls 2 library calls 49083->49099 49084->49072 49087 446cd5 _free 20 API calls 49085->49087 49089 44710b 49087->49089 49088 44711a 49088->49085 49090 447121 49088->49090 49092 447146 SetLastError 49089->49092 49100 446f41 20 API calls __Tolower 49090->49100 49101 4455c6 38 API calls _Atexit 49092->49101 49093 44712c 49095 446cd5 _free 20 API calls 49093->49095 49097 447133 49095->49097 49097->49084 49097->49092 49098->49080 49099->49088 49100->49093 49103 4470cf __Tolower 38 API calls 49102->49103 49104 41a65f 49103->49104 49104->49076 49108 41acc4 _Yarn ___scrt_fastfail 49105->49108 49106 401f66 28 API calls 49107 41ad39 49106->49107 49107->48679 49108->49106 49109->48695 49111 414081 49110->49111 49112 41408b getaddrinfo WSASetLastError 49110->49112 49140 413f0f 35 API calls ___std_exception_copy 49111->49140 49112->48720 49114 414086 49114->49112 49141 41ab50 GlobalMemoryStatusEx 49115->49141 49117 41ab8d 49117->48720 49142 41371e 49118->49142 49122 40ccbc ___scrt_fastfail 49121->49122 49123 412735 3 API calls 49122->49123 49124 40ccf2 49123->49124 49125 403b40 28 API calls 49124->49125 49126 40cd03 49125->49126 49126->48720 49128 40cc0d 49127->49128 49129 412546 3 API calls 49128->49129 49130 40cc14 49129->49130 49131 41258f 3 API calls 49130->49131 49132 40cc2c 49130->49132 49131->49132 49132->48720 49134 401f66 28 API calls 49133->49134 49135 40e776 49134->49135 49135->48720 49136->48720 49137->48720 49138->48720 49139->48720 49140->49114 49141->49117 49145 4136f1 49142->49145 49146 413706 ___scrt_initialize_default_local_stdio_options 49145->49146 49149 43e4ed 49146->49149 49152 43b240 49149->49152 49153 43b280 49152->49153 49154 43b268 49152->49154 49153->49154 49156 43b288 49153->49156 49169 445564 20 API calls _free 49154->49169 49171 4394ee 38 API calls 2 library calls 49156->49171 49157 43b26d 49170 43aa37 26 API calls _Deallocate 49157->49170 49160 43b298 49172 43b9c6 20 API calls 2 library calls 49160->49172 49161 43b278 49162 433f37 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 49161->49162 49164 413714 49162->49164 49164->48720 49165 43b310 49173 43c034 50 API calls 3 library calls 49165->49173 49168 43b31b 49174 43ba30 20 API calls _free 49168->49174 49169->49157 49170->49161 49171->49160 49172->49165 49173->49168 49174->49161 49176->48784 49177->48812 49178->48811 49179->48800 49180->48804 49181->48810 49184 40e642 49182->49184 49183 41258f 3 API calls 49183->49184 49184->49183 49185 40e6e6 49184->49185 49188 40e6d6 Sleep 49184->49188 49204 40e674 49184->49204 49187 4082dc 28 API calls 49185->49187 49186 4082dc 28 API calls 49186->49204 49190 40e6f1 49187->49190 49188->49184 49189 41b013 28 API calls 49189->49204 49192 41b013 28 API calls 49190->49192 49193 40e6fd 49192->49193 49217 41284c 29 API calls 49193->49217 49196 401e13 26 API calls 49196->49204 49197 40e710 49198 401e13 26 API calls 49197->49198 49200 40e71c 49198->49200 49199 401f66 28 API calls 49199->49204 49201 401f66 28 API calls 49200->49201 49202 40e72d 49201->49202 49205 4127aa 29 API calls 49202->49205 49203 4127aa 29 API calls 49203->49204 49204->49186 49204->49188 49204->49189 49204->49196 49204->49199 49204->49203 49215 40bf04 73 API calls ___scrt_fastfail 49204->49215 49216 41284c 29 API calls 49204->49216 49206 40e740 49205->49206 49218 411771 TerminateProcess WaitForSingleObject 49206->49218 49208 40e748 ExitProcess 49219 41170f 61 API calls 49212->49219 49216->49204 49217->49197 49218->49208 49220 43aba8 49222 43abb4 _swprintf ___DestructExceptionObject 49220->49222 49221 43abc2 49238 445564 20 API calls _free 49221->49238 49222->49221 49225 43abec 49222->49225 49224 43abc7 49239 43aa37 26 API calls _Deallocate 49224->49239 49233 444cdc EnterCriticalSection 49225->49233 49228 43abf7 49234 43ac98 49228->49234 49231 43abd2 __wsopen_s 49233->49228 49236 43aca6 49234->49236 49235 43ac02 49240 43ac1f LeaveCriticalSection std::_Lockit::~_Lockit 49235->49240 49236->49235 49241 448626 39 API calls 2 library calls 49236->49241 49238->49224 49239->49231 49240->49231 49241->49236 49242 402bcc 49243 402bd7 49242->49243 49244 402bdf 49242->49244 49250 403315 49243->49250 49246 402beb 49244->49246 49259 4015d3 49244->49259 49251 4015d3 22 API calls 49250->49251 49252 40332a 49251->49252 49253 402bdd 49252->49253 49254 40333b 49252->49254 49269 43a9bc 26 API calls 3 library calls 49254->49269 49256 43aa56 49270 43aa64 11 API calls _Atexit 49256->49270 49258 43aa63 49261 433818 49259->49261 49260 43aa9c _Yarn 21 API calls 49260->49261 49261->49260 49262 402be9 49261->49262 49265 433839 std::_Facet_Register 49261->49265 49271 442410 7 API calls 2 library calls 49261->49271 49264 433ff7 std::_Facet_Register 49273 437de7 RaiseException 49264->49273 49265->49264 49272 437de7 RaiseException 49265->49272 49267 434014 49269->49256 49270->49258 49271->49261 49272->49264 49273->49267 49274 414f4c 49289 41a726 49274->49289 49276 414f55 49277 401fbd 28 API calls 49276->49277 49278 414f64 49277->49278 49279 404468 60 API calls 49278->49279 49280 414f70 49279->49280 49281 401eea 26 API calls 49280->49281 49282 414f79 49281->49282 49283 401d8c 26 API calls 49282->49283 49284 4163d6 49283->49284 49285 401eea 26 API calls 49284->49285 49286 4163e2 49285->49286 49287 401eea 26 API calls 49286->49287 49288 4163ee 49287->49288 49290 41a734 49289->49290 49291 43aa9c _Yarn 21 API calls 49290->49291 49292 41a73e InternetOpenW InternetOpenUrlW 49291->49292 49293 41a767 InternetReadFile 49292->49293 49297 41a78a 49293->49297 49294 401f86 28 API calls 49294->49297 49295 41a7b7 InternetCloseHandle InternetCloseHandle 49296 41a7c9 49295->49296 49296->49276 49297->49293 49297->49294 49297->49295 49298 401eea 26 API calls 49297->49298 49298->49297

                                  Control-flow Graph

                                  APIs
                                  • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF03
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF0C
                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF23
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF26
                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF38
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF3B
                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF4C
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF4F
                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D856), ref: 0041BF60
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF63
                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D856), ref: 0041BF70
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF73
                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D856), ref: 0041BF80
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF83
                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D856), ref: 0041BF90
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BF93
                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D856), ref: 0041BFA4
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BFA7
                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D856), ref: 0041BFB4
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BFB7
                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D856), ref: 0041BFC8
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BFCB
                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D856), ref: 0041BFDC
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BFDF
                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D856), ref: 0041BFF0
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041BFF3
                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D856), ref: 0041C000
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C003
                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D856), ref: 0041C011
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C014
                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040D856), ref: 0041C021
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C024
                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040D856), ref: 0041C036
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C039
                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040D856), ref: 0041C046
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C049
                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040D856), ref: 0041C05B
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C05E
                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040D856), ref: 0041C06B
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041C06E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$HandleLibraryLoadModule
                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                  • API String ID: 384173800-625181639
                                  • Opcode ID: b0b2e61fc073e98d70dce9ef4f7eaaaad63808f39ef958059982ad015adeb2a9
                                  • Instruction ID: 91c85bc0cfa8e625a7056272f5779649be84715ca0db9f9d819234a6a75bf275
                                  • Opcode Fuzzy Hash: b0b2e61fc073e98d70dce9ef4f7eaaaad63808f39ef958059982ad015adeb2a9
                                  • Instruction Fuzzy Hash: 4C31E2A0E8035C7ADB207BB69CC9F3B7E6DD9847953510427B54893190EB7DEC408EAE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1260 41894a-418976 call 404bb1 call 403b60 1265 418978-4189a7 call 404bb1 * 3 1260->1265 1266 4189ac-4189af 1260->1266 1305 418b75-418b88 call 417c7e 1265->1305 1268 4189b1-418a07 call 404bb1 * 4 call 418cb4 1266->1268 1269 418a0c-418a0f 1266->1269 1334 418aca-418acb 1268->1334 1271 418a11-418a6a call 404bb1 * 4 call 4187cd call 418ba6 1269->1271 1272 418a6c-418a6f 1269->1272 1271->1334 1274 418a71-418ac5 call 404bb1 * 4 call 4187cd call 418c07 1272->1274 1275 418ad0-418ad3 1272->1275 1274->1334 1280 418b21-418b24 1275->1280 1281 418ad5-418b1f call 404bb1 * 3 call 4187cd call 418c68 1275->1281 1286 418b26-418b29 1280->1286 1287 418b2b-418b2e 1280->1287 1301 418b8d-418ba5 call 401eea * 2 1281->1301 1293 418b33-418b40 mouse_event 1286->1293 1294 418b30-418b31 1287->1294 1295 418b42-418b45 1287->1295 1293->1301 1294->1293 1295->1301 1302 418b47-418b70 call 404bb1 * 3 1295->1302 1302->1305 1305->1301 1334->1301
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0$1$2$3$4$5$6$7
                                  • API String ID: 0-3177665633
                                  • Opcode ID: a9de58ba0c2801d14e688282b77566cfdf8eed5a7e5a556e6b9892cffd9b18c5
                                  • Instruction ID: a206eb20bee8e87b23b85030021c48398d73e585fead2f4b7fd4ae1d02439eb2
                                  • Opcode Fuzzy Hash: a9de58ba0c2801d14e688282b77566cfdf8eed5a7e5a556e6b9892cffd9b18c5
                                  • Instruction Fuzzy Hash: EA61D5B4108301AEDB00EF21C862FEA77E4AF95750F44485EF591672E2DF78AA48C797

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1442 4099e4-4099fd 1443 409a63-409a73 GetMessageA 1442->1443 1444 4099ff-409a19 GetModuleHandleA SetWindowsHookExA 1442->1444 1445 409a75-409a8d TranslateMessage DispatchMessageA 1443->1445 1446 409a8f 1443->1446 1444->1443 1447 409a1b-409a61 GetLastError call 41af51 call 404c9e call 401f66 call 41a891 call 401eea 1444->1447 1445->1443 1445->1446 1449 409a91-409a96 1446->1449 1447->1449
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                  • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                  • GetLastError.KERNEL32 ref: 00409A1B
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                  • TranslateMessage.USER32(?), ref: 00409A7A
                                  • DispatchMessageA.USER32(?), ref: 00409A85
                                  Strings
                                  • Keylogger initialization failure: error , xrefs: 00409A32
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                  • String ID: Keylogger initialization failure: error
                                  • API String ID: 3219506041-952744263
                                  • Opcode ID: d18730f85669cb230c4623b663f0c744b4f5d15589cfdaaa540fabe1f56e8766
                                  • Instruction ID: 916e88852ed13b3ab14e3660f0b3d121b0d8821096f38c6baae7fa71b0b7a026
                                  • Opcode Fuzzy Hash: d18730f85669cb230c4623b663f0c744b4f5d15589cfdaaa540fabe1f56e8766
                                  • Instruction Fuzzy Hash: 6D118271604301AFC710BB7A9C4996B77ECAB94B15B10057EFC45E2191EE34DA01CBAA

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 0041258F: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                    • Part of subcall function 0041258F: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                    • Part of subcall function 0041258F: RegCloseKey.KERNEL32(?), ref: 004125D8
                                  • Sleep.KERNEL32(00000BB8), ref: 0040E6DB
                                  • ExitProcess.KERNEL32 ref: 0040E74A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                  • String ID: 6.0.0 Pro$override$pth_unenc
                                  • API String ID: 2281282204-4012039065
                                  • Opcode ID: f421cdf6d9c6d8049a3e57c2dc73a36603adb0feb741279f5af10ed514b8101a
                                  • Instruction ID: 41eca1b412dc6cb4cbd69e66e1420b1d2a9bda06de9f36a729d5cd10817e4b5d
                                  • Opcode Fuzzy Hash: f421cdf6d9c6d8049a3e57c2dc73a36603adb0feb741279f5af10ed514b8101a
                                  • Instruction Fuzzy Hash: A821D131F1420027D60876778857B6F399A9B81719F90052EF819A72E7EEBD9E1083DF
                                  APIs
                                  • GetLocalTime.KERNEL32(00000001,00474EE0,004755B0,00000000,?,?,?,?,?,00414F1C,?,00000001), ref: 00404946
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,004755B0,00000000,?,?,?,?,?,00414F1C,?,00000001), ref: 00404994
                                  • CreateThread.KERNEL32(00000000,00000000,00404B1D,?,00000000,00000000), ref: 004049A7
                                  Strings
                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040495C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$EventLocalThreadTime
                                  • String ID: KeepAlive | Enabled | Timeout:
                                  • API String ID: 2532271599-1507639952
                                  • Opcode ID: bc9bf88564fe88bac39ee81bd5498bc3c7810f38d668c3ffa8bf170065fcb83f
                                  • Instruction ID: 334fa9fd2124ebc6c4f40b6d461b17bc354faf393a4ed588a06a33f3771f6744
                                  • Opcode Fuzzy Hash: bc9bf88564fe88bac39ee81bd5498bc3c7810f38d668c3ffa8bf170065fcb83f
                                  • Instruction Fuzzy Hash: 1611E3B19052547ACB10A7BA8849BDB7F9CAB86364F00007FF50462292DA789845CBFA
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                  • SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                  • recv.WS2_32(?,?,?,00000000), ref: 0040459F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EventObjectSingleWaitrecv
                                  • String ID:
                                  • API String ID: 311754179-0
                                  • Opcode ID: e9776599d1ec220d30db4bf84b70fc35cad7659389b29cba8a531b5175ba4202
                                  • Instruction ID: 6eb9ccf7f7f4a74ce0fca17a02289a90418c2efed9003feaedd78b13c881e648
                                  • Opcode Fuzzy Hash: e9776599d1ec220d30db4bf84b70fc35cad7659389b29cba8a531b5175ba4202
                                  • Instruction Fuzzy Hash: ABF08236108612BFD7015B10EC08E1AFBA2FB88721F20862EF611612A19F71EC21DB59
                                  APIs
                                  • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750FC), ref: 0041A9CA
                                  • GetUserNameW.ADVAPI32(?,0040E096), ref: 0041A9E2
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Name$ComputerUser
                                  • String ID:
                                  • API String ID: 4229901323-0
                                  • Opcode ID: c38e36c8d41ee46761b6a4ad2d0e2b40601694a6c822a335d006f55048ef3fa5
                                  • Instruction ID: dd4171341b6269d20eef4dfb17ad31a68228dcd82fcdc0eb213b330dd994abd5
                                  • Opcode Fuzzy Hash: c38e36c8d41ee46761b6a4ad2d0e2b40601694a6c822a335d006f55048ef3fa5
                                  • Instruction Fuzzy Hash: 16014F7290011CAADB00EB90DC49ADDBB7CEF44315F10016AB502B3195EFB4AB898A98
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004146BA,00474EE0,00475A38,00474EE0,00000000,00474EE0,?,00474EE0,6.0.0 Pro), ref: 0040E765
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 421515283829ddc35b956787f58d423e39949e6c6887f96e861c6dca66fe8524
                                  • Instruction ID: 426317967f55bc2b8d076a22fb2a8dcf1c85f3a8f112093483d3870effb55d88
                                  • Opcode Fuzzy Hash: 421515283829ddc35b956787f58d423e39949e6c6887f96e861c6dca66fe8524
                                  • Instruction Fuzzy Hash: A6D05E607002197BEA109691CC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF048AE1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5 40d83a-40d8bc call 41beee GetModuleFileNameW call 40e240 call 401fbd * 2 call 41b1ce call 40e995 call 401d8c call 43ea30 22 40d908-40d9d0 call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 5->22 23 40d8be-40d903 call 40ea5e call 401d64 call 401e8f call 40fd92 call 40ea0f call 40e22d 5->23 69 40d9d2-40da1d call 4085b4 call 401eef call 401eea call 401e8f call 41258f 22->69 70 40da23-40da3e call 401d64 call 40b125 22->70 49 40dd69-40dd7a call 401eea 23->49 69->70 101 40e20c-40e22c call 401e8f call 4129da call 41138d 69->101 80 40da40-40da5f call 401e8f call 41258f 70->80 81 40da78-40da7f call 40bed7 70->81 80->81 97 40da61-40da77 call 401e8f call 4129da 80->97 89 40da81-40da83 81->89 90 40da88-40da8f 81->90 94 40dd68 89->94 95 40da91 90->95 96 40da93-40da9f call 41a66e 90->96 94->49 95->96 103 40daa1-40daa3 96->103 104 40daa8-40daac 96->104 97->81 103->104 107 40daeb-40dafe call 401d64 call 401e8f 104->107 108 40daae call 40697b 104->108 127 40db00 call 4069ba 107->127 128 40db05-40db8d call 401d64 call 41b013 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 107->128 117 40dab3-40dab5 108->117 120 40dac1-40dad4 call 401d64 call 401e8f 117->120 121 40dab7-40dabc call 40699d call 4064d0 117->121 120->107 137 40dad6-40dadc 120->137 121->120 127->128 163 40dbf5-40dbf9 128->163 164 40db8f-40dba8 call 401d64 call 401e8f call 43a821 128->164 137->107 139 40dade-40dae4 137->139 139->107 142 40dae6 call 4064d0 139->142 142->107 166 40dd7d-40ddd4 call 436260 call 4022f8 call 401e8f * 2 call 412735 call 4082d7 163->166 167 40dbff-40dc06 163->167 164->163 191 40dbaa-40dbf0 call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 164->191 222 40ddd9-40de2f call 401d64 call 401e8f call 401f66 call 401e8f call 4127aa call 401d64 call 401e8f call 43a7f7 166->222 170 40dc84-40dc8e call 4082d7 167->170 171 40dc08-40dc82 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 167->171 177 40dc93-40dcb7 call 4022f8 call 433ad3 170->177 171->177 198 40dcc6 177->198 199 40dcb9-40dcc4 call 436260 177->199 191->163 204 40dcc8-40dd13 call 401e07 call 43e559 call 4022f8 call 401e8f call 4022f8 call 401e8f call 41297a 198->204 199->204 259 40dd18-40dd3d call 433adc call 401d64 call 40b125 204->259 273 40de31 222->273 274 40de4c-40de4e 222->274 259->222 272 40dd43-40dd64 call 401d64 call 41b013 call 40e2f1 259->272 272->222 292 40dd66 272->292 278 40de33-40de4a call 41c0bb CreateThread 273->278 275 40de50-40de52 274->275 276 40de54 274->276 275->278 279 40de5a-40df39 call 401f66 * 2 call 41a891 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 43a7f7 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 276->279 278->279 330 40df74 279->330 331 40df3b-40df72 call 433818 call 401d64 call 401e8f CreateThread 279->331 292->94 333 40df76-40df8e call 401d64 call 401e8f 330->333 331->333 343 40df90-40dfc7 call 433818 call 401d64 call 401e8f CreateThread 333->343 344 40dfcc-40dfdf call 401d64 call 401e8f 333->344 343->344 354 40dfe1-40e03a call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 CreateThread 344->354 355 40e03f-40e052 call 401d64 call 401e8f 344->355 354->355 365 40e054-40e088 call 401d64 call 401e8f call 401d64 call 401e8f call 43a7f7 call 40b95c 355->365 366 40e08d-40e0b1 call 41a9ad call 401e18 call 401e13 355->366 365->366 388 40e0b3-40e0b4 SetProcessDEPPolicy 366->388 389 40e0b6-40e0c9 CreateThread 366->389 388->389 390 40e0d7-40e0de 389->390 391 40e0cb-40e0d5 CreateThread 389->391 394 40e0e0-40e0ea CreateThread 390->394 395 40e0ec-40e0f3 390->395 391->390 394->395 398 40e0f5-40e0f8 395->398 399 40e106-40e10b 395->399 401 40e146-40e161 call 401e8f call 412546 398->401 402 40e0fa-40e104 398->402 404 40e110-40e141 call 401f66 call 404c9e call 401f66 call 41a891 call 401eea 399->404 413 40e167-40e1a7 call 41b013 call 401e07 call 41265c call 401e13 call 401e07 401->413 414 40e1fd-40e207 call 40cbac call 40cc37 call 4140ac 401->414 402->404 404->401 435 40e1c0-40e1c5 DeleteFileW 413->435 414->101 436 40e1c7-40e1f8 call 41b013 call 401e07 call 412a52 call 401e13 * 2 435->436 437 40e1a9-40e1ac 435->437 436->414 437->436 438 40e1ae-40e1bb Sleep call 401e07 437->438 438->435
                                  APIs
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF03
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF0C
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040D856), ref: 0041BF23
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF26
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF38
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF3B
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040D856), ref: 0041BF4C
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF4F
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040D856), ref: 0041BF60
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF63
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040D856), ref: 0041BF70
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF73
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040D856), ref: 0041BF80
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF83
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040D856), ref: 0041BF90
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BF93
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040D856), ref: 0041BFA4
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFA7
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040D856), ref: 0041BFB4
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFB7
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040D856), ref: 0041BFC8
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFCB
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040D856), ref: 0041BFDC
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFDF
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040D856), ref: 0041BFF0
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041BFF3
                                    • Part of subcall function 0041BEEE: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040D856), ref: 0041C000
                                    • Part of subcall function 0041BEEE: GetProcAddress.KERNEL32(00000000), ref: 0041C003
                                    • Part of subcall function 0041BEEE: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040D856), ref: 0041C011
                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe,00000104), ref: 0040D863
                                    • Part of subcall function 0040FD92: __EH_prolog.LIBCMT ref: 0040FD97
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                  • String ID: SG$0TG$8SG$8SG$Access Level: $Administrator$C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe$Exe$Inj$PSG$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$hSG$licence$license_code.txt
                                  • API String ID: 2830904901-3089908927
                                  • Opcode ID: 0594d9b2a5c8721a9b0f3eff75ed75ac23b4dc375cca0bdcfa7f2c3d8d313acc
                                  • Instruction ID: b96e9d53b64ce9762df997b7c443b274fb73bccd3fe431706256fac2145036cf
                                  • Opcode Fuzzy Hash: 0594d9b2a5c8721a9b0f3eff75ed75ac23b4dc375cca0bdcfa7f2c3d8d313acc
                                  • Instruction Fuzzy Hash: 2E32C760B043406ADA14B776DC57BBE259A9F81748F00483FB9467B2E2DEBC9D44C39E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 449 418195-4181dc CreateDCA CreateCompatibleDC call 418648 452 4181e2-4181ff call 41868a 449->452 453 4181de-4181e0 449->453 454 418203-418205 452->454 453->452 453->454 456 41820b-41820d 454->456 457 41859d-4185a4 call 401f66 454->457 456->457 459 418213-418247 call 4186be CreateCompatibleBitmap 456->459 462 4185a9-4185b5 457->462 464 418249-41825a DeleteDC * 2 459->464 465 41825f-418269 SelectObject 459->465 466 418597 DeleteObject 464->466 467 418584-418593 DeleteDC * 2 465->467 468 41826f-418291 StretchBlt 465->468 466->457 467->466 468->467 469 418297-41829c 468->469 470 418318-418320 469->470 471 41829e-4182b3 469->471 472 418322-418329 470->472 473 41835c-418371 GetObjectA 470->473 471->470 480 4182b5-4182c9 GetIconInfo 471->480 476 41832b-41834a BitBlt 472->476 477 41834c-418359 472->477 473->467 474 418377-418389 473->474 478 41838b-41838d 474->478 479 41838f-418395 474->479 476->473 477->473 481 4183c2-4183e1 LocalAlloc 478->481 479->481 482 418397-41839d 479->482 480->470 483 4182cb-418314 DeleteObject * 2 DrawIcon 480->483 485 4183e2-41840d 481->485 482->481 484 41839f-4183a5 482->484 483->470 484->481 486 4183a7-4183aa 484->486 487 418417-41844a GlobalAlloc 485->487 488 41840f-418414 485->488 489 4183ac-4183bd LocalAlloc 486->489 490 4183bf-4183c1 486->490 487->467 491 418450-418469 GetDIBits 487->491 488->487 489->485 490->481 492 418491-418559 call 401faa * 2 call 402325 call 402f08 call 402325 call 402f08 call 402325 call 402f08 DeleteObject GlobalFree DeleteDC 491->492 493 41846b-41848c DeleteDC * 2 DeleteObject GlobalFree 491->493 510 41855b-41855c DeleteDC 492->510 511 41855e-41857d call 401f29 call 401eea * 2 492->511 493->457 510->511 517 418582 511->517 517->462
                                  APIs
                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004181AF
                                  • CreateCompatibleDC.GDI32(00000000), ref: 004181BA
                                    • Part of subcall function 00418648: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418678
                                  • CreateCompatibleBitmap.GDI32(?,00000000), ref: 0041823B
                                  • DeleteDC.GDI32(?), ref: 00418253
                                  • DeleteDC.GDI32(00000000), ref: 00418256
                                  • SelectObject.GDI32(00000000,00000000), ref: 00418261
                                  • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418289
                                  • GetIconInfo.USER32(?,?), ref: 004182C1
                                  • DeleteObject.GDI32(?), ref: 004182F0
                                  • DeleteObject.GDI32(?), ref: 004182FD
                                  • DrawIcon.USER32(00000000,?,?,?), ref: 0041830A
                                  • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00660046), ref: 0041833A
                                  • GetObjectA.GDI32(?,00000018,?), ref: 00418369
                                  • LocalAlloc.KERNEL32(00000040,00000028), ref: 004183B2
                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 004183D5
                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 0041843E
                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00418461
                                  • DeleteDC.GDI32(?), ref: 00418475
                                  • DeleteDC.GDI32(00000000), ref: 00418478
                                  • DeleteObject.GDI32(00000000), ref: 0041847B
                                  • GlobalFree.KERNEL32(00CC0020), ref: 00418486
                                  • DeleteObject.GDI32(00000000), ref: 0041853A
                                  • GlobalFree.KERNELBASE(?), ref: 00418541
                                  • DeleteDC.GDI32(?), ref: 00418551
                                  • DeleteDC.GDI32(00000000), ref: 0041855C
                                  • DeleteDC.GDI32(?), ref: 0041858E
                                  • DeleteDC.GDI32(00000000), ref: 00418591
                                  • DeleteObject.GDI32(?), ref: 00418597
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Delete$Object$AllocCreateGlobal$CompatibleFreeIconLocal$BitmapBitsDisplayDrawEnumInfoSelectSettingsStretch
                                  • String ID: DISPLAY
                                  • API String ID: 1765752176-865373369
                                  • Opcode ID: f014c3f535cdc39c90e2c208b2cef83b763ee17ec47546c29dc6992d331a2ac1
                                  • Instruction ID: a1654617e6feb41a21483335bab58d6c80918fdf06c9fa75f2eb3c48c5790805
                                  • Opcode Fuzzy Hash: f014c3f535cdc39c90e2c208b2cef83b763ee17ec47546c29dc6992d331a2ac1
                                  • Instruction Fuzzy Hash: EFC16C31504344AFD7209F21CC44BABBBE9EF88751F44482EF989A32A1DF34E945CB5A

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 518 4140ac-4140f7 call 401faa call 41ac7e call 401faa call 401d64 call 401e8f call 43a7f7 531 414106-414154 call 401f66 call 401d64 call 401fbd call 41b1ce call 404262 call 401d64 call 40b125 518->531 532 4140f9-414100 Sleep 518->532 547 414156-4141c5 call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 531->547 548 4141c8-414262 call 401f66 call 401d64 call 401fbd call 41b1ce call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 531->548 532->531 547->548 601 414272-414279 548->601 602 414264-414270 548->602 603 41427e-41431a call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a891 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 414072 601->603 602->603 630 414367-414375 call 4041f1 603->630 631 41431c-414362 WSAGetLastError call 41be81 call 404c9e call 401f66 call 41a891 call 401eea 603->631 636 4143a2-4143b7 call 404915 call 40428c 630->636 637 414377-41439d call 401f66 * 2 call 41a891 630->637 653 414ce6-414cf8 call 4047eb call 4020b4 631->653 636->653 654 4143bd-41450a call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a891 call 401eea * 4 call 41ab78 call 41375b call 4082dc call 440e5e call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 412735 636->654 637->653 667 414d20-414d28 call 401d8c 653->667 668 414cfa-414d1a call 401d64 call 401e8f call 43a7f7 Sleep 653->668 718 41450c-414519 call 40541d 654->718 719 41451e-414545 call 401e8f call 4125eb 654->719 667->548 668->667 718->719 725 414547-414549 719->725 726 41454c-414c4d call 403b40 call 41aff9 call 40cc9a call 41b0d3 call 40cbf1 call 41aff9 call 41b0d3 call 41af51 call 401d64 GetTickCount call 41af51 call 41aeab call 41af51 * 2 call 41ae5d call 41b0d3 * 5 call 40e751 call 41b0d3 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 4027cb call 40275c call 4027cb call 40275c call 404468 call 401eea * 54 call 401e13 call 401eea * 7 call 401e13 call 401eea call 401e13 call 4045d5 719->726 725->726 999 414c52-414c59 726->999 1000 414c5b-414c62 999->1000 1001 414c6d-414c74 999->1001 1000->1001 1002 414c64-414c66 1000->1002 1003 414c80-414cb2 call 405415 call 401f66 * 2 call 41a891 1001->1003 1004 414c76-414c7b call 40a767 1001->1004 1002->1001 1015 414cb4-414cc0 CreateThread 1003->1015 1016 414cc6-414ce1 call 401eea * 2 call 401e13 1003->1016 1004->1003 1015->1016 1016->653
                                  APIs
                                  • Sleep.KERNEL32(00000000,00000029,00475308,?,00000000), ref: 00414100
                                  • WSAGetLastError.WS2_32 ref: 00414321
                                  • Sleep.KERNEL32(00000000,00000002), ref: 00414D1A
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$ErrorLastLocalTime
                                  • String ID: | $%I64u$6.0.0 Pro$C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$PhNG$TLS Off$TLS On $dMG$hSG$hlight$name$NG$NG$UG$VG
                                  • API String ID: 524882891-3697509818
                                  • Opcode ID: cba9574a81fdbd1965ccfbce74c93add01a9028576c14112c3b54c9fb10de30e
                                  • Instruction ID: c3263a97f07b8ae9d11225c8127e62ab27a72c03ae3a8f764161ebb565a1ac44
                                  • Opcode Fuzzy Hash: cba9574a81fdbd1965ccfbce74c93add01a9028576c14112c3b54c9fb10de30e
                                  • Instruction Fuzzy Hash: EE625E71A001145ACB18F771DDA6AEE73659FA0308F1041BFB80A771E2EF785E85CA9D

                                  Control-flow Graph

                                  APIs
                                  • __Init_thread_footer.LIBCMT ref: 0040A456
                                  • Sleep.KERNEL32(000001F4), ref: 0040A461
                                  • GetForegroundWindow.USER32 ref: 0040A467
                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                  • Sleep.KERNEL32(000003E8), ref: 0040A574
                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                  • String ID: [${ User has been idle for $ minutes }$<mG$<mG$<mG$]
                                  • API String ID: 911427763-3636820255
                                  • Opcode ID: 89f2fb798528b21680e5d26758fc8fa0f7a9c1d46c1229a9f80a86482ea440bb
                                  • Instruction ID: ab9145b4e211f5f3da3af6290e6e7a2c9d96cae7f6b46a2c86e206227f6ebbf0
                                  • Opcode Fuzzy Hash: 89f2fb798528b21680e5d26758fc8fa0f7a9c1d46c1229a9f80a86482ea440bb
                                  • Instruction Fuzzy Hash: 1951D0716043409BC324FB25D886AAE7795AF84718F00093FF446A32E2DF7C9E55868F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1103 40428c-4042ad connect 1104 4043e1-4043e5 1103->1104 1105 4042b3-4042b6 1103->1105 1108 4043e7-4043f5 WSAGetLastError 1104->1108 1109 40445f 1104->1109 1106 4043da-4043dc 1105->1106 1107 4042bc-4042bf 1105->1107 1110 404461-404465 1106->1110 1111 4042c1-4042e8 call 404cbf call 401f66 call 41a891 1107->1111 1112 4042eb-4042f5 call 42035c 1107->1112 1108->1109 1113 4043f7-4043fa 1108->1113 1109->1110 1111->1112 1122 404306-404313 call 42057e 1112->1122 1123 4042f7-404301 1112->1123 1115 404439-40443e 1113->1115 1116 4043fc-404437 call 41be81 call 404c9e call 401f66 call 41a891 call 401eea 1113->1116 1118 404443-40445c call 401f66 * 2 call 41a891 1115->1118 1116->1109 1118->1109 1135 404315-404338 call 401f66 * 2 call 41a891 1122->1135 1136 40434c-404357 call 42113f 1122->1136 1123->1118 1165 40433b-404347 call 42039c 1135->1165 1148 404389-404396 call 4204f5 1136->1148 1149 404359-404387 call 401f66 * 2 call 41a891 call 42079d 1136->1149 1162 404398-4043bb call 401f66 * 2 call 41a891 1148->1162 1163 4043be-4043d7 CreateEventW * 2 1148->1163 1149->1165 1162->1163 1163->1106 1165->1109
                                  APIs
                                  • connect.WS2_32(?,?,?), ref: 004042A5
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043CB
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,?,?,0040192B), ref: 004043D5
                                  • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                  • API String ID: 994465650-2151626615
                                  • Opcode ID: 3de94ab0e66eda819ef2ab692e3ed842bea7be81516bcb9effce6a7158ccd530
                                  • Instruction ID: 8d860672b69a19ae3c360ccb47b0a38bc4e99592ce22fc56bfe6acc5d0e7da0a
                                  • Opcode Fuzzy Hash: 3de94ab0e66eda819ef2ab692e3ed842bea7be81516bcb9effce6a7158ccd530
                                  • Instruction Fuzzy Hash: D54109B0B0020277CA04B77A884766E7A55AB85314B80012FE901A7AD3FE3DAD2587DF

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1178 40c89e-40c8c3 call 401e52 1181 40c8c9 1178->1181 1182 40c9ed-40ca13 call 401e07 GetLongPathNameW call 403b40 1178->1182 1183 40c8d0-40c8d5 1181->1183 1184 40c9c2-40c9c7 1181->1184 1185 40c905-40c90a 1181->1185 1186 40c9d8 1181->1186 1187 40c9c9-40c9ce call 43ae1f 1181->1187 1188 40c8da-40c8e8 call 41a956 call 401e18 1181->1188 1189 40c8fb-40c900 1181->1189 1190 40c9bb-40c9c0 1181->1190 1191 40c90f-40c916 call 41b366 1181->1191 1206 40ca18-40ca85 call 403b40 call 40cd0a call 402860 * 2 call 401e13 * 5 1182->1206 1194 40c9dd-40c9e2 call 43ae1f 1183->1194 1184->1194 1185->1194 1186->1194 1198 40c9d3-40c9d6 1187->1198 1210 40c8ed 1188->1210 1189->1194 1190->1194 1207 40c918-40c968 call 403b40 call 43ae1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1191->1207 1208 40c96a-40c9b6 call 403b40 call 43ae1f call 403b40 call 402860 call 401e18 call 401e13 * 2 1191->1208 1203 40c9e3-40c9e8 call 4082d7 1194->1203 1198->1186 1198->1203 1203->1182 1216 40c8f1-40c8f6 call 401e13 1207->1216 1208->1210 1210->1216 1216->1182
                                  APIs
                                  • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LongNamePath
                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                  • API String ID: 82841172-425784914
                                  • Opcode ID: 8058316647152c20abd1cdabdfa83951e42b6909899b53d80ef63206f3cf228c
                                  • Instruction ID: f058a63a2e06dcb2b247864a9289bab0e783a4957c20bc3838a58b63f1508e50
                                  • Opcode Fuzzy Hash: 8058316647152c20abd1cdabdfa83951e42b6909899b53d80ef63206f3cf228c
                                  • Instruction Fuzzy Hash: F0415C721482009AC214F721DC97DAFB7A4AE90759F10063FF546720E2EE7CAA59C69F

                                  Control-flow Graph

                                  APIs
                                  • Sleep.KERNEL32(00001388), ref: 00409E62
                                    • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                    • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                    • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                    • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                  • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                    • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                  • String ID: PSG$PSG
                                  • API String ID: 3795512280-3836871860
                                  • Opcode ID: f51c8a451bae5ce4cb9b41d7c84fb8ee8e58ebb1526cc16bd191c939a7bee33b
                                  • Instruction ID: 2e46ee78bd67d64478951c63fc585b7447d0c94e1b250d5b4a4871e09aa14890
                                  • Opcode Fuzzy Hash: f51c8a451bae5ce4cb9b41d7c84fb8ee8e58ebb1526cc16bd191c939a7bee33b
                                  • Instruction Fuzzy Hash: 68517F716043005ACB05BB71C866ABF779AAF81309F00453FF886B71E2DE7D9D45C69A

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                    • Part of subcall function 004125EB: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                    • Part of subcall function 004125EB: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                    • Part of subcall function 004125EB: RegCloseKey.KERNEL32(?), ref: 00412637
                                  • StrToIntA.SHLWAPI(00000000,0046CC58,?,00000000,00000000,004750FC,00000003,Exe,00000000,0000000E,00000000,0046656C,00000003,00000000), ref: 0041A6E4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCurrentOpenProcessQueryValue
                                  • String ID: (32 bit)$ (64 bit)$8ZG$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                  • API String ID: 1866151309-1475859423
                                  • Opcode ID: 8bb5d8e7f89d1d66d189f69efb5f33a0046ea50dbfee033791c9c80dded757db
                                  • Instruction ID: 1adcdd06a104af508aeef54d465e0c78d2d81651f2e3fe11076ab4bcd17b792f
                                  • Opcode Fuzzy Hash: 8bb5d8e7f89d1d66d189f69efb5f33a0046ea50dbfee033791c9c80dded757db
                                  • Instruction Fuzzy Hash: 1811C660A001012AC704B3A6DCDBDBF765A9B91304F44413FB856A71E2FB6C9D9583EE

                                  Control-flow Graph

                                  APIs
                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A749
                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041A75F
                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A778
                                  • InternetCloseHandle.WININET(00000000), ref: 0041A7BE
                                  • InternetCloseHandle.WININET(00000000), ref: 0041A7C1
                                  Strings
                                  • http://geoplugin.net/json.gp, xrefs: 0041A759
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CloseHandleOpen$FileRead
                                  • String ID: http://geoplugin.net/json.gp
                                  • API String ID: 3121278467-91888290
                                  • Opcode ID: 18955b8fabe3660c6f83c06147cef84eb9f6d6413300c9467b7eacfb49d9d00e
                                  • Instruction ID: dd066ffe0ad47051801ff1a9504fa95a24023bf504f9cdcf24902ddc36d2e50e
                                  • Opcode Fuzzy Hash: 18955b8fabe3660c6f83c06147cef84eb9f6d6413300c9467b7eacfb49d9d00e
                                  • Instruction Fuzzy Hash: C311947110A3126BD624EB169C85DBF7BECEF86765F00043EF845A2191DF68D848C6BA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1548 409d97-409da7 1549 409e44-409e47 1548->1549 1550 409dad-409daf 1548->1550 1551 409db2-409dd8 call 401e07 CreateFileW 1550->1551 1554 409e18 1551->1554 1555 409dda-409de8 GetFileSize 1551->1555 1558 409e1b-409e1f 1554->1558 1556 409dea 1555->1556 1557 409e0f-409e16 CloseHandle 1555->1557 1559 409df4-409dfb 1556->1559 1560 409dec-409df2 1556->1560 1557->1558 1558->1551 1561 409e21-409e24 1558->1561 1562 409e04-409e09 Sleep 1559->1562 1563 409dfd-409dff call 40a7f0 1559->1563 1560->1557 1560->1559 1561->1549 1564 409e26-409e2d 1561->1564 1562->1557 1563->1562 1564->1549 1566 409e2f-409e3f call 4082dc call 4098a5 1564->1566 1566->1549
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                  • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                  • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleSizeSleep
                                  • String ID: pQG
                                  • API String ID: 1958988193-3769108836
                                  • Opcode ID: a8be8c16880439c766c810802cad88d1de10d530097162c07d361957ed4d994b
                                  • Instruction ID: 007c54a35b5ab6fada7f5b2b4f31fda992404cc28ee9ac254c5285dcec39f6dc
                                  • Opcode Fuzzy Hash: a8be8c16880439c766c810802cad88d1de10d530097162c07d361957ed4d994b
                                  • Instruction Fuzzy Hash: 0911E730640B406AE720E724D88972F7B9AAB81316F44047EF18566AE3CA799CD5C29D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1570 4127aa-4127c1 RegCreateKeyA 1571 4127c3-4127f8 call 4022f8 call 401e8f RegSetValueExA RegCloseKey 1570->1571 1572 4127fa 1570->1572 1573 4127fc-412808 call 401eea 1571->1573 1572->1573
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004127B9
                                  • RegSetValueExA.KERNEL32(?,XwF,00000000,?,00000000,00000000,00475308,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127E1
                                  • RegCloseKey.KERNEL32(?,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: XwF$pth_unenc
                                  • API String ID: 1818849710-1649331827
                                  • Opcode ID: 003af5593e895fcdf7f1354251e976ce7b0cb98045418862ca23e2dd2000f068
                                  • Instruction ID: b42ea712bc7a6ff48bd64609183fdbccf638e423d93a2202917fd6756948167f
                                  • Opcode Fuzzy Hash: 003af5593e895fcdf7f1354251e976ce7b0cb98045418862ca23e2dd2000f068
                                  • Instruction Fuzzy Hash: 27F06D32140204BBCB00AFA1DD45AEF3768EF00751B108169B916B60A1EE759E04EBA4
                                  APIs
                                  • GetLastError.KERNEL32(0000000A,0000000B,0000000A,00445569,00440CA8,00000000,?,?,?,?,00440E8B,00000000,0000000A,000000FF,0000000A,00000000), ref: 00447158
                                  • _free.LIBCMT ref: 0044718D
                                  • _free.LIBCMT ref: 004471B4
                                  • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 004471C1
                                  • SetLastError.KERNEL32(00000000,0000000A,00000000), ref: 004471CA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free
                                  • String ID:
                                  • API String ID: 3170660625-0
                                  • Opcode ID: c73b76ca02ce190c9082a6036dde6ca48763b4b9e088bcde2ec0a65c3a46cc10
                                  • Instruction ID: 9627307c59aa3692a64de8377ee3c20019e30fe80ec8d82769d3f9bfdfbdb6fb
                                  • Opcode Fuzzy Hash: c73b76ca02ce190c9082a6036dde6ca48763b4b9e088bcde2ec0a65c3a46cc10
                                  • Instruction Fuzzy Hash: 3E01F97624CB102BB30267B95C85D2B2A29DBC17B6726012FF509A6392EF2C8C07515D
                                  APIs
                                  • send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  • WaitForSingleObject.KERNEL32(?,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                  • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EventObjectSingleWaitsend
                                  • String ID: {NAL
                                  • API String ID: 3963590051-1903569844
                                  • Opcode ID: b5de4d74b5d400c31c2a5d84294cf86768d6602e9c4e63d79063061539c9c55f
                                  • Instruction ID: 09920f02ef31e30e393b68ef0c8285e211ae926702cc5adcda46913b737bad1c
                                  • Opcode Fuzzy Hash: b5de4d74b5d400c31c2a5d84294cf86768d6602e9c4e63d79063061539c9c55f
                                  • Instruction Fuzzy Hash: 552137B29005156BCF04ABA5DC96DEE777CBF54358B00413EF916B21E1EE78A504C6E4
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040993A
                                  • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 00409946
                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread$LocalTimewsprintf
                                  • String ID: Offline Keylogger Started
                                  • API String ID: 465354869-4114347211
                                  • Opcode ID: cc1b8e756a79e7dfddc5899faecbeca08fcee506b9212d88ec03cf3c6ecf7b49
                                  • Instruction ID: 15e43fcc554e39227c644a0273f32637653ac1eeca6ef832bd6c9a92d0497390
                                  • Opcode Fuzzy Hash: cc1b8e756a79e7dfddc5899faecbeca08fcee506b9212d88ec03cf3c6ecf7b49
                                  • Instruction Fuzzy Hash: 0A1198B15003097AD224BA36CC86DBF7A5CDA813A8B40053EB845622D3EA785E14C6FB
                                  APIs
                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                  • RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                  • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: TeF
                                  • API String ID: 1818849710-331424825
                                  • Opcode ID: 69388a3f5ca785ef31159ee28a7932d701a8b17d3c2adace4bd37096d90c6bf5
                                  • Instruction ID: 5082c9e4fe043c0a9a82c1e0a3a4def458545ef8caf92c2e29ea1f35f3ad8a86
                                  • Opcode Fuzzy Hash: 69388a3f5ca785ef31159ee28a7932d701a8b17d3c2adace4bd37096d90c6bf5
                                  • Instruction Fuzzy Hash: C9E03971640308BFDF119B919C05FDB3BA8EB04B95F004165FA05F61A1DAB1DE18EBA8
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                  • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404797
                                  • CloseHandle.KERNEL32(?,?,00000000), ref: 004047A0
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                  • String ID:
                                  • API String ID: 3360349984-0
                                  • Opcode ID: 9617c1c77b3540baec9c61ab2e4dd9d42702906bdf543f674b1f8784a173c439
                                  • Instruction ID: 5371640f48c6a0368c7cea64887978d4ac2a240c02499e3407376e9d4191e8ff
                                  • Opcode Fuzzy Hash: 9617c1c77b3540baec9c61ab2e4dd9d42702906bdf543f674b1f8784a173c439
                                  • Instruction Fuzzy Hash: 10417171504301ABC700FB61CC55D7FBBE9AFD5315F00093EF892A32E2EE389909866A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SystemTimes$Sleep__aulldiv
                                  • String ID:
                                  • API String ID: 188215759-0
                                  • Opcode ID: a7e496ea74412c4f74dd561fc1d9e5efe2a930fde01781876ab294e7da94f75c
                                  • Instruction ID: 7cb4eddd506215a21d9c44be4850b318e12e80d273729b61be08d6c7a3dfdc1e
                                  • Opcode Fuzzy Hash: a7e496ea74412c4f74dd561fc1d9e5efe2a930fde01781876ab294e7da94f75c
                                  • Instruction Fuzzy Hash: 9A216D725043009FC304EF65D9858AFB7E8EFC8714F044A2EF58593251EA38EA49CBA7
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B7F6
                                  • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B80A
                                  • CloseHandle.KERNEL32(00000000), ref: 0041B817
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandlePointerWrite
                                  • String ID:
                                  • API String ID: 3604237281-0
                                  • Opcode ID: 801f75d00fac8da0c66411ebabb5881698d5c73b15829ac97cd3568d121a9cb6
                                  • Instruction ID: fca0af3f27241acfb9d15a16a542bc487c24adb9e916811621f81636ea96e045
                                  • Opcode Fuzzy Hash: 801f75d00fac8da0c66411ebabb5881698d5c73b15829ac97cd3568d121a9cb6
                                  • Instruction Fuzzy Hash: 1501F5712052057FE6105E249CC9EBB739CEB82B75F10063EF662D23C1DB25CC8686B9
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CountEventTick
                                  • String ID: NG
                                  • API String ID: 180926312-1651712548
                                  • Opcode ID: 060940e25ac8971c94ae7a490dbd6ea47cd5478e2e271b8134bfcfb9f4dcc145
                                  • Instruction ID: 085b2f02be9ab0868ba51c73fb921716b1faa5b055701b3286f453889ed4f7a0
                                  • Opcode Fuzzy Hash: 060940e25ac8971c94ae7a490dbd6ea47cd5478e2e271b8134bfcfb9f4dcc145
                                  • Instruction Fuzzy Hash: C85182321042409AC624FB71D8A2AEF73E5AFD0304F00453FB94A671E2EF789949C69E
                                  APIs
                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040DA7D,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,0046656C,00000003,00000000), ref: 0040BEE6
                                  • GetLastError.KERNEL32 ref: 0040BEF1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateErrorLastMutex
                                  • String ID: 8SG
                                  • API String ID: 1925916568-2887235486
                                  • Opcode ID: b5077f7ec388620cf5be0ca51e32a1ab35e6e66f7e0f9972a02b1c78fa9675f2
                                  • Instruction ID: 2210f0ff69d3cac9d22e7a3f14049619627ec1602d204fa864a150733b7892bf
                                  • Opcode Fuzzy Hash: b5077f7ec388620cf5be0ca51e32a1ab35e6e66f7e0f9972a02b1c78fa9675f2
                                  • Instruction Fuzzy Hash: B9D012702057009BE70817709D4E76D3951D784703F00407DB90BE51E1CEA488409519
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                  • RegCloseKey.KERNEL32(?), ref: 00412637
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: a01adbe8d93d7843240e1245e145c4eb73053e88c38affbd61dab3a9f8b8539c
                                  • Instruction ID: 14faf112d3046a25d46051106a5b1d66d342437105d793e51b0bcc882fecfd0c
                                  • Opcode Fuzzy Hash: a01adbe8d93d7843240e1245e145c4eb73053e88c38affbd61dab3a9f8b8539c
                                  • Instruction Fuzzy Hash: D8F0D176900118BBCB209B91DD09EDF7B7CEB44B50F00406ABA05F2190DA749E599BA8
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                  • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                  • RegCloseKey.KERNEL32(00000000), ref: 00412775
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 2290404c5028f19351fda844a65f428930317fa0cea8d3593e6495ca7ac6aa60
                                  • Instruction ID: 218a6bf298efa18a53fa985214dbde7e418f837aa6fd6996b0f70a828ecfe766
                                  • Opcode Fuzzy Hash: 2290404c5028f19351fda844a65f428930317fa0cea8d3593e6495ca7ac6aa60
                                  • Instruction Fuzzy Hash: 6501AD35800229BFDF215F91DC09DDF7F38EF05760F004065BA08A20A0EB3589A9DBA4
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                  • RegCloseKey.KERNEL32(?), ref: 004125D8
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: f2bc15ec1dd87dd5d2b8e96f704feec537dddf8cd8f352820b88cb246238aa27
                                  • Instruction ID: f1b1b21d3432ee16d2560aa6e8f8b6fc3b679f7482eced78fea8614e15db81c1
                                  • Opcode Fuzzy Hash: f2bc15ec1dd87dd5d2b8e96f704feec537dddf8cd8f352820b88cb246238aa27
                                  • Instruction Fuzzy Hash: B4F03075A00208BFDF119FA09C45FDEBBB8EB04B55F104065FA05F6191D670DA54DB94
                                  APIs
                                  • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004670E0), ref: 0041255D
                                  • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004670E0), ref: 00412571
                                  • RegCloseKey.KERNEL32(?,?,?,0040B996,004670E0), ref: 0041257C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 90b816baf6681459c689896bd7ee7621983de5913a9f55156db5b466bfdb1e74
                                  • Instruction ID: da5e3a6b8615f7fc9763e362b131f946d251b316bd2acc507b7b22157b73f9fc
                                  • Opcode Fuzzy Hash: 90b816baf6681459c689896bd7ee7621983de5913a9f55156db5b466bfdb1e74
                                  • Instruction Fuzzy Hash: 1BE03931941224BB9B200BA29D09EDB7F6DEF06BA1B010455B809A2111DAA18E54EAF4
                                  APIs
                                  • GdiplusStartup.GDIPLUS(00474AF4,?,00000000,004757C0,?,00000000), ref: 00417AF9
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(0040466D,000000FF,00000000,?,?,00000000,?,0040466D,00000000,?,?), ref: 004047FD
                                    • Part of subcall function 004047EB: SetEvent.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404808
                                    • Part of subcall function 004047EB: CloseHandle.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404811
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventGdiplusHandleObjectSingleStartupWaitsend
                                  • String ID: NG
                                  • API String ID: 3841810518-1651712548
                                  • Opcode ID: e934312635e02f6cccf21a1a845dedef51b8525978cf4b269c9f685e1ca40080
                                  • Instruction ID: 24f710431f87bb8c4a71e67c72c2239940d7293f2891f037fe4f689efd11e20a
                                  • Opcode Fuzzy Hash: e934312635e02f6cccf21a1a845dedef51b8525978cf4b269c9f685e1ca40080
                                  • Instruction Fuzzy Hash: FF4172713042005BC618FB71D8A2AFFB395ABD4308F10453FF94A572D2EF78594A869E
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041AB2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID: @
                                  • API String ID: 1890195054-2766056989
                                  • Opcode ID: 1f373de7373fca73aae67113848499a281b9ea6c5d4bde3cba777b2765641b05
                                  • Instruction ID: c886a1cb5b033e49400669607b807ed2acfa4fc0ecd365fa3ec0929bbc02049d
                                  • Opcode Fuzzy Hash: 1f373de7373fca73aae67113848499a281b9ea6c5d4bde3cba777b2765641b05
                                  • Instruction Fuzzy Hash: 96E0C2B6901228EBCB10DFA9E98498DFBF8FF48664B008126E909B3344D370E805CB90
                                  APIs
                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041AB64
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalMemoryStatus
                                  • String ID: @
                                  • API String ID: 1890195054-2766056989
                                  • Opcode ID: a4fe8e15525f2be1febd29730eb74c732a6063ed027868c332be47892e1af589
                                  • Instruction ID: b665d68c061e3f9f56ba9c4249da2251c097319f67e9030db6e937b6cf7da2fa
                                  • Opcode Fuzzy Hash: a4fe8e15525f2be1febd29730eb74c732a6063ed027868c332be47892e1af589
                                  • Instruction Fuzzy Hash: 00D067B59013189FCB20DFA8E945A8DBBF8EB48214F004529E946E3744E774E945CB94
                                  APIs
                                  • GdipLoadImageFromStream.GDIPLUS(?,?,?,00417E11,00000000,?,?,?,?,00000000), ref: 0041799C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FromGdipImageLoadStream
                                  • String ID: YyA
                                  • API String ID: 3292405956-1661632404
                                  • Opcode ID: 6b815a9a4963b74d3bc1a2751b028ab6595660ed9c8fdd428ea3c8c463bc3307
                                  • Instruction ID: c416f4b8239c06ff0a3ca34b47412c7883467aa553140555bb067b5d2f2a4f94
                                  • Opcode Fuzzy Hash: 6b815a9a4963b74d3bc1a2751b028ab6595660ed9c8fdd428ea3c8c463bc3307
                                  • Instruction Fuzzy Hash: 6DD0C9725002119FC3619F04EC40A92B7E8EB55713F11C92FA896D2620E7B4AC448F64
                                  APIs
                                  • GdipDisposeImage.GDIPLUS(?,00417EC2), ref: 004179B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DisposeGdipImage
                                  • String ID: YyA
                                  • API String ID: 1024088383-1661632404
                                  • Opcode ID: 0b75b8e188b2c1e080c05397ff57465d29dfdffccc3d46a70387a439a8051644
                                  • Instruction ID: a6b1128ee4d630f398833de059b196f96dd36f7b291f3e06f0aea0641f1b368d
                                  • Opcode Fuzzy Hash: 0b75b8e188b2c1e080c05397ff57465d29dfdffccc3d46a70387a439a8051644
                                  • Instruction Fuzzy Hash: 80A00174481202DFCF025F60AA49414BEA5AB5770A324C299988959222EB77D416DF6A
                                  APIs
                                  • socket.WS2_32(?,00000001,00000006), ref: 00404212
                                    • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateEventStartupsocket
                                  • String ID:
                                  • API String ID: 1953588214-0
                                  • Opcode ID: 9dcc25316a99288ac387cf2e613c868b0e107fead0b532e7680f1acbcbd447ec
                                  • Instruction ID: e62a462d4859cb901c95814de100b0ae44c334504336dc08fc7633b5118be932
                                  • Opcode Fuzzy Hash: 9dcc25316a99288ac387cf2e613c868b0e107fead0b532e7680f1acbcbd447ec
                                  • Instruction Fuzzy Hash: 100171B0508B809FD7358F38B8456977FE0AB15314F044DAEF1D697BA1C7B5A481CB18
                                  APIs
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00433FF2
                                    • Part of subcall function 00437DE7: RaiseException.KERNEL32(?,?,00434621,?,?,?,?,?,?,?,?,00434621,?,0046E654,0041AF80,?), ref: 00437E47
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0043400F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Exception@8Throw$ExceptionRaise
                                  • String ID:
                                  • API String ID: 3476068407-0
                                  • Opcode ID: aa33f71218ff2e33c7e0abf3df586dfddbac15aa65d93ad702ff3d6b6945e10b
                                  • Instruction ID: 1c2073f64fee591a786a8a3f9c67cac18272885bad9296719f7a79fda1cbf913
                                  • Opcode Fuzzy Hash: aa33f71218ff2e33c7e0abf3df586dfddbac15aa65d93ad702ff3d6b6945e10b
                                  • Instruction Fuzzy Hash: 1BF0BB25C0430D768B04BEA6E80A9AD33BC5E08329F50513BB825914D1FB7C9759C5CD
                                  APIs
                                  • GetForegroundWindow.USER32 ref: 0041AE7F
                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AE92
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$ForegroundText
                                  • String ID:
                                  • API String ID: 29597999-0
                                  • Opcode ID: 27a61dc13c3baf2ab93a997f5cd2cb0d43e4b22d1e77ef92c0de48519faa66db
                                  • Instruction ID: 7a6786a6daea7d79da8b38e9164549a295f8c3929764bf887eb2819544a3ffc0
                                  • Opcode Fuzzy Hash: 27a61dc13c3baf2ab93a997f5cd2cb0d43e4b22d1e77ef92c0de48519faa66db
                                  • Instruction Fuzzy Hash: 4AE04875A0031867FB20B7659C4EFD6766C9704B05F0400ADB619E21C3EDB4EA048BE4
                                  APIs
                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,00472B28,004750FC,00000000,00414318,00000000,00000001), ref: 00414094
                                  • WSASetLastError.WS2_32(00000000), ref: 00414099
                                    • Part of subcall function 00413F0F: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413F5E
                                    • Part of subcall function 00413F0F: LoadLibraryA.KERNEL32(?), ref: 00413FA0
                                    • Part of subcall function 00413F0F: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413FC0
                                    • Part of subcall function 00413F0F: FreeLibrary.KERNEL32(00000000), ref: 00413FC7
                                    • Part of subcall function 00413F0F: LoadLibraryA.KERNEL32(?), ref: 00413FFF
                                    • Part of subcall function 00413F0F: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414011
                                    • Part of subcall function 00413F0F: FreeLibrary.KERNEL32(00000000), ref: 00414018
                                    • Part of subcall function 00413F0F: GetProcAddress.KERNEL32(00000000,?), ref: 00414027
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                  • String ID:
                                  • API String ID: 1170566393-0
                                  • Opcode ID: 82e440812e84df215c52e3f2a247b94cffd3b5d9bcffb41726cfdd66b840233f
                                  • Instruction ID: e2cb8cd332084910a557c38b5932e5372e8318120e5bc29c0191cd414ba32ecd
                                  • Opcode Fuzzy Hash: 82e440812e84df215c52e3f2a247b94cffd3b5d9bcffb41726cfdd66b840233f
                                  • Instruction Fuzzy Hash: F4D012326406216B93506B6D5D01EBB5AEDDF96761B06003BF508D6111DA946C4142A8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _wcslen
                                  • String ID:
                                  • API String ID: 176396367-0
                                  • Opcode ID: 025e3e4768cc8a802bf55c327d7a2483ad7764abdea9560a4cc63c803d4be503
                                  • Instruction ID: 7b719d08391bbb12b01dd12fa1e9474f3c31e37c6e717f7fed2b29792a4b3228
                                  • Opcode Fuzzy Hash: 025e3e4768cc8a802bf55c327d7a2483ad7764abdea9560a4cc63c803d4be503
                                  • Instruction Fuzzy Hash: B71193329002059BCB05FF66D8529EE77A4EF54319B10443FF842662E2EF78A915CB98
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,0000000A,00000000,?,00447184,00000001,00000364,?,?,00440E8B,00000000,0000000A,000000FF,0000000A,00000000,?), ref: 00448957
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 2c0c69a6d0450f8205c6b3d3ecae47eb244d617f5f4b8047d462909e87cbea64
                                  • Instruction ID: 26c2e56809404158c0b29fa9b74778046e098960ac6c1563bbfba353e7bfba60
                                  • Opcode Fuzzy Hash: 2c0c69a6d0450f8205c6b3d3ecae47eb244d617f5f4b8047d462909e87cbea64
                                  • Instruction Fuzzy Hash: EBF0E971504E35ABBB315A669D46B7F7749EF41B70B14802FBC08B6290CE78D80197EE
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 0df71086ebe011a22fdff847967a9c5229befe104b2723ee1c4cd472e7f23894
                                  • Instruction ID: 40638bbf90b8c7646580dfe44e72c34c865d7c07d7b9b06d8b79509a7ad90776
                                  • Opcode Fuzzy Hash: 0df71086ebe011a22fdff847967a9c5229befe104b2723ee1c4cd472e7f23894
                                  • Instruction Fuzzy Hash: 52E0E5B1B00220A6FB202A6A8C02B5B36498F437B4F070033AC0A9A291CE6CCC4081AF
                                  APIs
                                  • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Startup
                                  • String ID:
                                  • API String ID: 724789610-0
                                  • Opcode ID: 512c305c5d81d862cf08042479f934390d4c65f7aad148c3c3ac63496dcf4775
                                  • Instruction ID: a6df37c1a3c4b0bfee4e794801b63ea3b6ec8424062e123ecf3ffc10766d7ffb
                                  • Opcode Fuzzy Hash: 512c305c5d81d862cf08042479f934390d4c65f7aad148c3c3ac63496dcf4775
                                  • Instruction Fuzzy Hash: F7D012325586094ED620AAB5AD0F8A4775CD317611F0003BA6CB5825D3FA84561CC6AB
                                  APIs
                                  • GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00417E67,00000000,?,?), ref: 00417A0D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GdipImageSaveStream
                                  • String ID:
                                  • API String ID: 971487142-0
                                  • Opcode ID: 560899ce446b4df5cbbf587b5dc22dc3b23c0c7b5a029273649944ab77091904
                                  • Instruction ID: 234b4fee382431d5f696987cdba4a48248ff408daa68a05ea21ce747e8bf2435
                                  • Opcode Fuzzy Hash: 560899ce446b4df5cbbf587b5dc22dc3b23c0c7b5a029273649944ab77091904
                                  • Instruction Fuzzy Hash: B9C01272008351AF8B12DF40DC05D6FBFA6FF98310B040C1DF56541120CB218864DB55
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00000000,Function_000045C6,00475920,00000000,00000000), ref: 004045BD
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: f82cd8bf721802bda6ad9a3339813e43b5bd2c1f5f501421a36ff160661b679e
                                  • Instruction ID: 5d7dc6040bb5beb69a998e0b7efaeee5010d171735069ebf598f78582634bb40
                                  • Opcode Fuzzy Hash: f82cd8bf721802bda6ad9a3339813e43b5bd2c1f5f501421a36ff160661b679e
                                  • Instruction Fuzzy Hash: 94C04CF19102007FA600CF20CD49C3776DCE75074172185697904D2141D575DD01C539
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Deallocate
                                  • String ID:
                                  • API String ID: 1075933841-0
                                  • Opcode ID: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                  • Instruction ID: a98dd8728e001a7547a03d6555be836c7c4d92c50a1b5b3c87ce8ff60de75990
                                  • Opcode Fuzzy Hash: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                  • Instruction Fuzzy Hash: 69A0123300C2016AC9852E00DD05C0ABFA1EB90360F20C41FF086140F0CB32A0B0A705
                                  APIs
                                  • __Init_thread_footer.LIBCMT ref: 0040508E
                                    • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                    • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  • __Init_thread_footer.LIBCMT ref: 004050CB
                                  • CreatePipe.KERNEL32(00476D14,00476CFC,00476C20,00000000,0046656C,00000000), ref: 0040515E
                                  • CreatePipe.KERNEL32(00476D00,00476D1C,00476C20,00000000), ref: 00405174
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476C30,00476D04), ref: 004051E7
                                    • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                    • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                    • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,00466570,00000062,00466554), ref: 0040538E
                                  • Sleep.KERNEL32(00000064,00000062,00466554), ref: 004053A8
                                  • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                  • CloseHandle.KERNEL32 ref: 004053CD
                                  • CloseHandle.KERNEL32 ref: 004053D5
                                  • CloseHandle.KERNEL32 ref: 004053E7
                                  • CloseHandle.KERNEL32 ref: 004053EF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCriticalHandleSection$CreatePipe$EnterFileInit_thread_footerLeaveProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                  • String ID: lG$ mG$ mG$ mG$0lG$SystemDrive$cmd.exe$xlG$xlG$xlG$xlG$xlG
                                  • API String ID: 3815868655-3731297122
                                  • Opcode ID: 3416e0b7a9ab2e8475615790bf4b42608ef81ca1a43c57928c40c3b77ce5ef90
                                  • Instruction ID: f3d75f47542da312923ddfb9c6ddab2c5323933c8a72fe1ed5abf95ef94fff6a
                                  • Opcode Fuzzy Hash: 3416e0b7a9ab2e8475615790bf4b42608ef81ca1a43c57928c40c3b77ce5ef90
                                  • Instruction Fuzzy Hash: 3491C571600605AFC610BB65ED42A6F3BAAEB84344F01443FF949A22E2DF7D9C448F6D
                                  APIs
                                  • SetEvent.KERNEL32(?,?), ref: 00406F28
                                  • GetFileAttributesW.KERNEL32(00000000,00000000,00000000), ref: 00406FF8
                                  • DeleteFileW.KERNEL32(00000000), ref: 00407018
                                    • Part of subcall function 0041B63A: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B694
                                    • Part of subcall function 0041B63A: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B6C6
                                    • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B717
                                    • Part of subcall function 0041B63A: FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B76C
                                    • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B773
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                    • Part of subcall function 00406BE9: CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00466454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                    • Part of subcall function 00406BE9: WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                    • Part of subcall function 00406BE9: CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                    • Part of subcall function 00406BE9: MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                    • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                    • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00407416
                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004074F5
                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 0040773A
                                  • DeleteFileA.KERNEL32(?), ref: 004078CC
                                    • Part of subcall function 00407A8C: __EH_prolog.LIBCMT ref: 00407A91
                                    • Part of subcall function 00407A8C: FindFirstFileW.KERNEL32(00000000,?,00466AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                    • Part of subcall function 00407A8C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                  • Sleep.KERNEL32(000007D0), ref: 00407976
                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 004079BA
                                    • Part of subcall function 0041BD82: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BE77
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Find$AttributesCloseDeleteDirectoryEventFirstNextRemove$CreateDriveExecuteH_prologHandleInfoLocalLogicalMoveObjectParametersShellSingleSleepStringsSystemTimeWaitWritesend
                                  • String ID: @PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$VNG$open$pPG$pPG$pPG$pPG$NG
                                  • API String ID: 2918587301-3905578539
                                  • Opcode ID: a32d47f9191dda89bebe2cd936081c8e0da1ff7d5e9a7f5bebcc8624358dd399
                                  • Instruction ID: 1d2e2627ec10ef381271a766c0004beadc8049fa085ae304c46d09a1b017b010
                                  • Opcode Fuzzy Hash: a32d47f9191dda89bebe2cd936081c8e0da1ff7d5e9a7f5bebcc8624358dd399
                                  • Instruction Fuzzy Hash: 0F42A271A043005BC614FB76C8979AE76A59F90708F40493FF946771E2EE3CAA09C6DB
                                  APIs
                                  • GetCurrentProcessId.KERNEL32 ref: 0041101D
                                    • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                    • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                    • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00411059
                                  • CreateThread.KERNEL32(00000000,00000000,0041170F,00000000,00000000,00000000), ref: 004110BE
                                    • Part of subcall function 0041258F: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004125AF
                                    • Part of subcall function 0041258F: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,00475308), ref: 004125CD
                                    • Part of subcall function 0041258F: RegCloseKey.KERNEL32(?), ref: 004125D8
                                  • CloseHandle.KERNEL32(00000000), ref: 00411068
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00411332
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                  • String ID: 0TG$Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                  • API String ID: 65172268-427618296
                                  • Opcode ID: cce5ba87b7370ffeabc667a99c2fd1501aa6090f00cbce55658675b20f93cf83
                                  • Instruction ID: de889ccbd4d484bbc366ed6bf297281231fcf4352047712fae5372da0dd81bf3
                                  • Opcode Fuzzy Hash: cce5ba87b7370ffeabc667a99c2fd1501aa6090f00cbce55658675b20f93cf83
                                  • Instruction Fuzzy Hash: 3D717E3160420157C214FB72CC579AE77A8AF94719F40053FF986A21E2EF7C9A49C6AF
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B3B4
                                  • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                  • FindClose.KERNEL32(00000000), ref: 0040B517
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$CloseFile$FirstNext
                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                  • API String ID: 1164774033-3681987949
                                  • Opcode ID: f60dc40eb39ac72ddeb6ad73c15d962a45f8a5f1cba306fcb922ac7305482b47
                                  • Instruction ID: 4260ee55bd24f38cfaff6d718e7bb7aae0563b8f0cd35122f003610daf392ab1
                                  • Opcode Fuzzy Hash: f60dc40eb39ac72ddeb6ad73c15d962a45f8a5f1cba306fcb922ac7305482b47
                                  • Instruction Fuzzy Hash: 0A510B319042195ADB14F7A2DC96AEE7764EF50318F50017FF806B30E2EF789A45CA9D
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040B5B2
                                  • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                  • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                  • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$Close$File$FirstNext
                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                  • API String ID: 3527384056-432212279
                                  • Opcode ID: c6033163c9b867c0d80e27f6400ce1ab20a1c87c49643b46c9f20880bdd59d01
                                  • Instruction ID: 1e8de758c2b97f43aed4804fc6a56dd8ce4d3e4bc3adeefe5a602588f19c01c2
                                  • Opcode Fuzzy Hash: c6033163c9b867c0d80e27f6400ce1ab20a1c87c49643b46c9f20880bdd59d01
                                  • Instruction Fuzzy Hash: F4412C319042196ACB14F7A5EC569EE7768EE11318F50017FF802B31E2EF399A458A9E
                                  APIs
                                  • OpenClipboard.USER32 ref: 00415B5F
                                  • EmptyClipboard.USER32 ref: 00415B6D
                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 00415B8D
                                  • GlobalLock.KERNEL32(00000000), ref: 00415B96
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415BCC
                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00415BD5
                                  • CloseClipboard.USER32 ref: 00415BF2
                                  • OpenClipboard.USER32 ref: 00415BF9
                                  • GetClipboardData.USER32(0000000D), ref: 00415C09
                                  • GlobalLock.KERNEL32(00000000), ref: 00415C12
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415C1B
                                  • CloseClipboard.USER32 ref: 00415C21
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                  • String ID:
                                  • API String ID: 3520204547-0
                                  • Opcode ID: cc07caf996ff6d076e1eeb75bee4c200faab5da2a67908d4d3b469133882fce7
                                  • Instruction ID: a6dc46a1ac747b1df6f49b20b287b9a63e2ec98da8de7deae82efe0a0170cbcd
                                  • Opcode Fuzzy Hash: cc07caf996ff6d076e1eeb75bee4c200faab5da2a67908d4d3b469133882fce7
                                  • Instruction Fuzzy Hash: A82137711047009BC714BBB1DC5AAAF7669AF94B06F00443FF907A61E2EF38C945C76A
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,004750FC), ref: 0040E30B
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,004750FC), ref: 0040E336
                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E352
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E3D5
                                  • CloseHandle.KERNEL32(00000000,?,?,004750FC), ref: 0040E3E4
                                    • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                    • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                    • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                  • CloseHandle.KERNEL32(00000000,?,?,004750FC), ref: 0040E449
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                  • API String ID: 726551946-1743721670
                                  • Opcode ID: a3a35be969e31f0fa3240682cdf82f12369ddd4f8bd4dd9cec5ae51362d14e9c
                                  • Instruction ID: 57de327b15d82dbd2eac346b6cac6cdabb084366653080b34320caf9a24139d1
                                  • Opcode Fuzzy Hash: a3a35be969e31f0fa3240682cdf82f12369ddd4f8bd4dd9cec5ae51362d14e9c
                                  • Instruction Fuzzy Hash: A17150311043419BC714FB62D8529AFB7A5AFD1358F400D3EF986631E2EF389919CA9A
                                  APIs
                                  • GetForegroundWindow.USER32(?,?,00475108), ref: 00409B3F
                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                  • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                  • GetKeyState.USER32(00000010), ref: 00409B5C
                                  • GetKeyboardState.USER32(?,?,00475108), ref: 00409B67
                                  • ToUnicodeEx.USER32(0047515C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                  • ToUnicodeEx.USER32(0047515C,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                  • String ID: `kG
                                  • API String ID: 1888522110-3643241581
                                  • Opcode ID: c97b305c4e5192c039be4b57959f7d148ad44e176559ca20096398a0f42faa8b
                                  • Instruction ID: 5852d3e9e60d78bbc7fecef5f6baa999b7b2ba0a9f64a262714a670a3ee03c46
                                  • Opcode Fuzzy Hash: c97b305c4e5192c039be4b57959f7d148ad44e176559ca20096398a0f42faa8b
                                  • Instruction Fuzzy Hash: 3B318F72504308AFD700DF91DC45FDBB7ECEB88715F01083AB645D61A1DBB5E9488B9A
                                  APIs
                                  • _wcslen.LIBCMT ref: 00406788
                                  • CoGetObject.OLE32(?,00000024,004669B0,00000000), ref: 004067E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Object_wcslen
                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                  • API String ID: 240030777-3166923314
                                  • Opcode ID: 37d5bffcbb8f4b2cbb961f9636bb3800fd08e5c8d40d037755d6192962cbe9cf
                                  • Instruction ID: 6c9b37094527eb08cc4748ecdfbd23cbc672ad5faa28133fe458ce4522bc368c
                                  • Opcode Fuzzy Hash: 37d5bffcbb8f4b2cbb961f9636bb3800fd08e5c8d40d037755d6192962cbe9cf
                                  • Instruction Fuzzy Hash: B11133B29011186ADB10FAA58955A9E77BCDB48714F11047FF905F3281E77C9A0486BD
                                  APIs
                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,00475920), ref: 00419ACE
                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419B1D
                                  • GetLastError.KERNEL32 ref: 00419B2B
                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 00419B63
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                  • String ID:
                                  • API String ID: 3587775597-0
                                  • Opcode ID: 9a1ee3bf3d6bce16bbcabb7d3c2507a4bc347ace43e17270fa3d1e71e0279349
                                  • Instruction ID: 410433f0f292194423399e5208e7b63ee2478b974df0930e3a7ace9da88798fe
                                  • Opcode Fuzzy Hash: 9a1ee3bf3d6bce16bbcabb7d3c2507a4bc347ace43e17270fa3d1e71e0279349
                                  • Instruction Fuzzy Hash: C28142311043049BC314FB21DC95DAFB7A8BF94718F50492EF582621D2EF78EA09CB9A
                                  APIs
                                  • _free.LIBCMT ref: 004480CC
                                  • _free.LIBCMT ref: 004480F0
                                  • _free.LIBCMT ref: 00448277
                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045E478), ref: 00448289
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0047279C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448301
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727F0,000000FF,?,0000003F,00000000,?), ref: 0044832E
                                  • _free.LIBCMT ref: 00448443
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                  • String ID: xE
                                  • API String ID: 314583886-407097786
                                  • Opcode ID: 29f33701d0dde71fba102b35938b8b5784e7ceb7e6dd2606d32a2e84e67b5ec7
                                  • Instruction ID: 53eab31d398634ed2913b9f897b2f59caf849b5b19a8cc02276c673e3ebcc531
                                  • Opcode Fuzzy Hash: 29f33701d0dde71fba102b35938b8b5784e7ceb7e6dd2606d32a2e84e67b5ec7
                                  • Instruction Fuzzy Hash: 24C14731904205ABFB249F698D81AAF7BB8EF41310F2441AFE88497351EF798E42C75C
                                  APIs
                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B694
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B6C6
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,?,004752F0,00475308), ref: 0041B734
                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B741
                                    • Part of subcall function 0041B63A: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,?,004752F0,00475308), ref: 0041B717
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B76C
                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B773
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,004752F0,00475308), ref: 0041B77B
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,004752F0,00475308), ref: 0041B78E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                  • String ID:
                                  • API String ID: 2341273852-0
                                  • Opcode ID: 29d361786a175de539fdf9d753c964fcdbe74632238a9f507c15aa3fc292f646
                                  • Instruction ID: 009c1ade3c0c7cd9a9baeecb78710ce3116f293085b5e5d3e47bbce280e6f24a
                                  • Opcode Fuzzy Hash: 29d361786a175de539fdf9d753c964fcdbe74632238a9f507c15aa3fc292f646
                                  • Instruction Fuzzy Hash: 2931937180521CAACB20E7B19C89FDA777CAF55304F0404EBF515E2181EF799AC4CB69
                                  APIs
                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 004130F2
                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000001), ref: 004130FE
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004132C5
                                  • GetProcAddress.KERNEL32(00000000), ref: 004132CC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                  • API String ID: 2127411465-314212984
                                  • Opcode ID: 873ebbdf440dce3f88c262c3a4829dd9431ed5815be12e9cb480789c80129325
                                  • Instruction ID: 0508f95716d3db9771c6b78d28bd3d55684df0f5bc265fe56362dad8d88080f3
                                  • Opcode Fuzzy Hash: 873ebbdf440dce3f88c262c3a4829dd9431ed5815be12e9cb480789c80129325
                                  • Instruction Fuzzy Hash: CEB1A371A043006BC614FA76CC979BE76695F9471CF40063FF846B31E2EE7C9A48869B
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 004190B5
                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419181
                                    • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Find$CreateFirstNext
                                  • String ID: PSG$NG$VG$VG
                                  • API String ID: 341183262-216422830
                                  • Opcode ID: c18c5d7cc2ec127294a62739c3c80729bd111981e773be46c2ec41552c58774a
                                  • Instruction ID: 0b04574543ffaf1c42473f802d0f517b04b5d48d9dde9d4f65c428d20583ff9f
                                  • Opcode Fuzzy Hash: c18c5d7cc2ec127294a62739c3c80729bd111981e773be46c2ec41552c58774a
                                  • Instruction Fuzzy Hash: AF8150315042405AC314FB71C8A6EEF73A8AFD0718F50493FF946671E2EF389A49C69A
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004516D3
                                  • IsValidCodePage.KERNEL32(00000000), ref: 0045172E
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0045173D
                                  • GetLocaleInfoW.KERNEL32(?,00001001,00443EFC,00000040,?,0044401C,00000055,00000000,?,?,00000055,00000000), ref: 00451785
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00443F7C,00000040), ref: 004517A4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                  • String ID: (E
                                  • API String ID: 745075371-542121585
                                  • Opcode ID: a84efe1a2cce186fb5bbf2749623e7c2965abdb2206941bc4280497163ca2dcb
                                  • Instruction ID: 0c55cced660072bbdea70b00f38c40adf5ab32faa3293abc4b1f14fb3cf6f882
                                  • Opcode Fuzzy Hash: a84efe1a2cce186fb5bbf2749623e7c2965abdb2206941bc4280497163ca2dcb
                                  • Instruction Fuzzy Hash: EB5193719002059BDB10EFA5CC41BBF77B8AF04706F18056BFD11EB262DB789949CB69
                                  APIs
                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040B257
                                  • GetLastError.KERNEL32 ref: 0040B261
                                  Strings
                                  • UserProfile, xrefs: 0040B227
                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040B222
                                  • [Chrome StoredLogins not found], xrefs: 0040B27B
                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040B287
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteErrorFileLast
                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                  • API String ID: 2018770650-1062637481
                                  • Opcode ID: 7bd7e0a71dc55e2f05a60c9822167b84464631b2e0a9dbc3b4263f52b6270825
                                  • Instruction ID: af3d5975f8ef5736f4e1f689bc2271043fd855ebe8bb8600121af3fad6928989
                                  • Opcode Fuzzy Hash: 7bd7e0a71dc55e2f05a60c9822167b84464631b2e0a9dbc3b4263f52b6270825
                                  • Instruction Fuzzy Hash: 5C01D63168010597CA0476B6DC6F8AF3B24E921708B10017FF802731E2FF3A9905C6DE
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416CAA
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00416CB1
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416CC3
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416CE2
                                  • GetLastError.KERNEL32 ref: 00416CE8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 3534403312-3733053543
                                  • Opcode ID: 594fceb9dcf720018193b7af68db4771e8a957862718425d2e1bf0ede3cec24e
                                  • Instruction ID: cb90277d3e2bb8506008076be0b211c0c8a285b816e0fe18bd298ac82c07c5c8
                                  • Opcode Fuzzy Hash: 594fceb9dcf720018193b7af68db4771e8a957862718425d2e1bf0ede3cec24e
                                  • Instruction Fuzzy Hash: EEF0DA75901229BBDB109B91DC4DEEF7EBCEF05656F110065B805B20A2DE748A08CAA5
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 004089AE
                                    • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                    • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00408A8D
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408AE0
                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00408AF7
                                    • Part of subcall function 00404468: WaitForSingleObject.KERNEL32(?,00000000,{NAL,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000), ref: 0040450E
                                    • Part of subcall function 00404468: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,00474EE0,004755B0,00000000,?,?,?,?,?,00414E7B), ref: 0040453C
                                    • Part of subcall function 004047EB: WaitForSingleObject.KERNEL32(0040466D,000000FF,00000000,?,?,00000000,?,0040466D,00000000,?,?), ref: 004047FD
                                    • Part of subcall function 004047EB: SetEvent.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404808
                                    • Part of subcall function 004047EB: CloseHandle.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404811
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00408DA1
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$CloseEventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsendsocket
                                  • String ID:
                                  • API String ID: 4043647387-0
                                  • Opcode ID: a6c84999141094eea2a7914acdc4c3dcb6e780acf37f441bccc3a0eabee6c86c
                                  • Instruction ID: d6647de2ed81915fd1100427b9b1f0ab8477674b12134c2b00fdd843198b9521
                                  • Opcode Fuzzy Hash: a6c84999141094eea2a7914acdc4c3dcb6e780acf37f441bccc3a0eabee6c86c
                                  • Instruction Fuzzy Hash: 0DA16E719001089BCB14EBA1DD92AEDB779AF54318F10427FF506B71D2EF385E498B98
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,00419A10,00000000,00000000), ref: 00419DC3
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,00419A10,00000000,00000000), ref: 00419DD8
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419DE5
                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,00419A10,00000000,00000000), ref: 00419DF0
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419E02
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,00419A10,00000000,00000000), ref: 00419E05
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                  • String ID:
                                  • API String ID: 276877138-0
                                  • Opcode ID: af999b41650d3cd8b8f8fe088188ad5770f3288987236d92c8a0026e65871fc6
                                  • Instruction ID: bfab90d9ddd5c2d56401b7e15998ac1c6a079cb4321381bf248b2ffa9e014974
                                  • Opcode Fuzzy Hash: af999b41650d3cd8b8f8fe088188ad5770f3288987236d92c8a0026e65871fc6
                                  • Instruction Fuzzy Hash: 60F0E9715403146FD2115B31EC88DBF2A6CDF85BB2B01002EF442A3191CF78CD4995B5
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443F03,?,?,?,?,?,?,00000004), ref: 00450D71
                                  • _wcschr.LIBVCRUNTIME ref: 00450E01
                                  • _wcschr.LIBVCRUNTIME ref: 00450E0F
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443F03,00000000,00444023), ref: 00450EB2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                  • String ID: (E
                                  • API String ID: 4212172061-542121585
                                  • Opcode ID: 59e7985f3c02f7c10489d8edf0480172058bbcb387fbadea5ac0dcfc1ce8ddaa
                                  • Instruction ID: 16e6850baad922d2e300dda2121b2fdf61a8ef58a3873fa5b3432b878cecddba
                                  • Opcode Fuzzy Hash: 59e7985f3c02f7c10489d8edf0480172058bbcb387fbadea5ac0dcfc1ce8ddaa
                                  • Instruction Fuzzy Hash: A361FC7A500306AAD725AB75CC42ABB73A8EF44316F14082FFD05D7243EB78E949C769
                                  APIs
                                    • Part of subcall function 00416C9D: GetCurrentProcess.KERNEL32(00000028,?), ref: 00416CAA
                                    • Part of subcall function 00416C9D: OpenProcessToken.ADVAPI32(00000000), ref: 00416CB1
                                    • Part of subcall function 00416C9D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00416CC3
                                    • Part of subcall function 00416C9D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416CE2
                                    • Part of subcall function 00416C9D: GetLastError.KERNEL32 ref: 00416CE8
                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00415AF3
                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 00415B08
                                  • GetProcAddress.KERNEL32(00000000), ref: 00415B0F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                  • String ID: PowrProf.dll$SetSuspendState
                                  • API String ID: 1589313981-1420736420
                                  • Opcode ID: 86b5893e768e0e13360477bdb0defc34886795441577a5559bab3a2d7dc1305a
                                  • Instruction ID: be3657bdb4b9c596b700244bf1edaf45c421fe256a6f88bebcc25452880e9c8a
                                  • Opcode Fuzzy Hash: 86b5893e768e0e13360477bdb0defc34886795441577a5559bab3a2d7dc1305a
                                  • Instruction Fuzzy Hash: 84215E71644741A6CB14FBB198A6AFF22599F80748F40483FB442771D2EF7CE889865E
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451712,?,00000000), ref: 0045148C
                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451712,?,00000000), ref: 004514B5
                                  • GetACP.KERNEL32(?,?,00451712,?,00000000), ref: 004514CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: 7de529321666405c3dbd177549b20e94864b34fdb637d578d31b634f87125a95
                                  • Instruction ID: 27270ea0035267e4249f05f4639a08e7e92d7e6a6a5113c6df6fa5280cb26525
                                  • Opcode Fuzzy Hash: 7de529321666405c3dbd177549b20e94864b34fdb637d578d31b634f87125a95
                                  • Instruction Fuzzy Hash: 0821C731600100B7DB308F54C901FA773A6AF52B67F5A9566EC0AD7223EB3ADD49C399
                                  APIs
                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041A85B
                                  • LoadResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A86F
                                  • LockResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A876
                                  • SizeofResource.KERNEL32(00000000,?,?,0040E25B,00000000), ref: 0041A885
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID: SETTINGS
                                  • API String ID: 3473537107-594951305
                                  • Opcode ID: af91fd7a50235684c3f0857021386823e2c7131a01440ecb0520647964aa65c6
                                  • Instruction ID: 1fe06f9b0c9a023904624b9b61caa7bd4c13f92b8b5c35c0d543cfa28092256f
                                  • Opcode Fuzzy Hash: af91fd7a50235684c3f0857021386823e2c7131a01440ecb0520647964aa65c6
                                  • Instruction Fuzzy Hash: DAE01A76240720ABCB211BA1BD4CD073E39F7867637000039F549A2221CE75CC52CB29
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00407A91
                                  • FindFirstFileW.KERNEL32(00000000,?,00466AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$File$CloseFirstH_prologNext
                                  • String ID:
                                  • API String ID: 1157919129-0
                                  • Opcode ID: 458c4cd14ae4f9017ff53500914738011c44e03bc8e8f39dc4765d65b0750b24
                                  • Instruction ID: e1cc7e471fba1e38487cd482a49156f4879f85d64aa43a49cb1f79655cfb0c65
                                  • Opcode Fuzzy Hash: 458c4cd14ae4f9017ff53500914738011c44e03bc8e8f39dc4765d65b0750b24
                                  • Instruction Fuzzy Hash: 325162729001085ACB14FBA5DD969ED7B78AF50318F50417FB806B31D2EF3CAB498B99
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406234
                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 00406318
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DownloadExecuteFileShell
                                  • String ID: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe$open
                                  • API String ID: 2825088817-4159253631
                                  • Opcode ID: 893f71f27b6b0849fff010fbcbc9598768ca5abafe3a9edc094bd365604e6998
                                  • Instruction ID: e32f65eb076a11421f0b28df520d432f118a03887cfea0ef8c7e4d0a3f62d172
                                  • Opcode Fuzzy Hash: 893f71f27b6b0849fff010fbcbc9598768ca5abafe3a9edc094bd365604e6998
                                  • Instruction Fuzzy Hash: E361CF3160430067CA14FA76D8569BE37A59F81718F01493FBC46772E6EF3CAA05C69B
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$FirstNextsend
                                  • String ID: pPG$pPG
                                  • API String ID: 4113138495-3204143781
                                  • Opcode ID: c595c858632e4b630c745db85e1f9651263fe84311176f454f0f68f2edbe44ab
                                  • Instruction ID: b94dab712156e78be0f8cc3bef15d45c6a114b58aade1ae888b20ae253cfdc5a
                                  • Opcode Fuzzy Hash: c595c858632e4b630c745db85e1f9651263fe84311176f454f0f68f2edbe44ab
                                  • Instruction Fuzzy Hash: F42187715043015BC714FB61DC95DEF77A8AF90318F40093EF996A31E1EF38AA08CA9A
                                  APIs
                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BE77
                                    • Part of subcall function 004127AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004127B9
                                    • Part of subcall function 004127AA: RegSetValueExA.KERNEL32(?,XwF,00000000,?,00000000,00000000,00475308,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127E1
                                    • Part of subcall function 004127AA: RegCloseKey.KERNEL32(?,?,?,0040E6D3,00467758,6.0.0 Pro), ref: 004127EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateInfoParametersSystemValue
                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                  • API String ID: 4127273184-3576401099
                                  • Opcode ID: 66458e8cc3153e1574d54a22ceeec595ae1d5fb91ba42e72fdc85762ed94257a
                                  • Instruction ID: 3b74369dcb7a8544f1b55df16a592c3d868ba554001bd6a4c71ed5c97b6fc17b
                                  • Opcode Fuzzy Hash: 66458e8cc3153e1574d54a22ceeec595ae1d5fb91ba42e72fdc85762ed94257a
                                  • Instruction Fuzzy Hash: F5112132B8035033D518313A5E67BBF2816D34AB60F55415FB6066A6CAFADE4AA103DF
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00408DAC
                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$FirstH_prologNext
                                  • String ID:
                                  • API String ID: 301083792-0
                                  • Opcode ID: bcd3d9f6996f059f2558f11917fb654a90ab45b7422d36df760ea7f45a3727a1
                                  • Instruction ID: 402ed7a5658d2f2a6adb961a0daa6f616ba37c5e7974c2bf040f6c8ce137202a
                                  • Opcode Fuzzy Hash: bcd3d9f6996f059f2558f11917fb654a90ab45b7422d36df760ea7f45a3727a1
                                  • Instruction Fuzzy Hash: 127141728001199BCB15EBA1DC919EE7778AF54314F10427FE846B71E2EF385E49CB98
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004510CE
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045111F
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004511DF
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                  • String ID:
                                  • API String ID: 2829624132-0
                                  • Opcode ID: dd837d4aabf90151236531eaa8a7eeaa8db7e820d6096a7a5c305d7033fab590
                                  • Instruction ID: aee342ac21436657f5846041838c3bd09d84a4d920a4c2a145562aed062da8a9
                                  • Opcode Fuzzy Hash: dd837d4aabf90151236531eaa8a7eeaa8db7e820d6096a7a5c305d7033fab590
                                  • Instruction Fuzzy Hash: F661D8719005079BDB289F25CC82B7677A8EF04306F1041BBFD05D66A2EB78D949DB58
                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 0043A965
                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 0043A96F
                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 0043A97C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: af6e046c0509c32b3386d0bc76265e00dd1467fe013a3816057f721e951f2d82
                                  • Instruction ID: 2e36d9e0b5662236be867d7d52d6a22dc3a0b47d07fc7de068387a758ceea7c7
                                  • Opcode Fuzzy Hash: af6e046c0509c32b3386d0bc76265e00dd1467fe013a3816057f721e951f2d82
                                  • Instruction Fuzzy Hash: E731D6B491131CABCB21DF24D98978DB7B8BF08311F5051EAE80CA7251EB749F818F49
                                  APIs
                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,00000001,004328CD,00000024,00000006,?,00000000), ref: 00432B57
                                  • CryptGenRandom.ADVAPI32(?,?,?,?,?,?,?,?,?,0042CDC9,00000006), ref: 00432B6D
                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,?,?,?,?,?,0042CDC9,00000006), ref: 00432B7F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Crypt$Context$AcquireRandomRelease
                                  • String ID:
                                  • API String ID: 1815803762-0
                                  • Opcode ID: 35a60dd61fd8b237ab80bed8c3b3b6d5f5cecafcaafe6d2ae27acd69f3d7963f
                                  • Instruction ID: 69441ad90531868046e0b1178e1924530c202fcb63ed7aa5228c64bcbe668f15
                                  • Opcode Fuzzy Hash: 35a60dd61fd8b237ab80bed8c3b3b6d5f5cecafcaafe6d2ae27acd69f3d7963f
                                  • Instruction Fuzzy Hash: ADE09231608350FFFB300F25AC08F177B94EB89B65F21063AF155E40E4CAA59805961C
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 00442785
                                  • TerminateProcess.KERNEL32(00000000,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 0044278C
                                  • ExitProcess.KERNEL32 ref: 0044279E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 580307e7f9ed19ccdf9c10412063d8ea8bc62da0884c48fe7532ae208af4f440
                                  • Instruction ID: c8bd48e99420b6c7b8697c64d03bd4ba31791432aa3bec6fd876c0c539ce8582
                                  • Opcode Fuzzy Hash: 580307e7f9ed19ccdf9c10412063d8ea8bc62da0884c48fe7532ae208af4f440
                                  • Instruction Fuzzy Hash: 7EE04F31000704AFEF016F10DD099493F29EF50396F448469F90896132CF79DC42CA48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 90d0b4729825bd90b6a9b0e481f721cabe6d10aefd9ef70f2d231800c5ca14c4
                                  • Instruction ID: eafca5d3f29716c6c78e4e4ea3ad02361a474eaab44c7f235df41bcab4a95e78
                                  • Opcode Fuzzy Hash: 90d0b4729825bd90b6a9b0e481f721cabe6d10aefd9ef70f2d231800c5ca14c4
                                  • Instruction Fuzzy Hash: 3431F472D00249ABEB249E79CC85EFB7BBDDB85314F0401AEF419D7251E6349E418B54
                                  APIs
                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004477FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: GetLocaleInfoEx
                                  • API String ID: 2299586839-2904428671
                                  • Opcode ID: 6bd799bfac9af36fd133eb5d72b5b36b41e76e7aabeb18fd4f2c376b7933ddb9
                                  • Instruction ID: 58a0a1dc03b065be57d87c6409a63545e464c60cfee5b8c381720ea1698dad41
                                  • Opcode Fuzzy Hash: 6bd799bfac9af36fd133eb5d72b5b36b41e76e7aabeb18fd4f2c376b7933ddb9
                                  • Instruction Fuzzy Hash: A0F0F631640318B7DB056F61CC06F6E7B64DB04712F10019AFC0467252CF75AB119A9D
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 0044712E
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045131E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                  • String ID:
                                  • API String ID: 1663032902-0
                                  • Opcode ID: bc85fdc09d4fce3dfbe50538f39d64f32c4b6099e2a05669c9b1daebb1f6e385
                                  • Instruction ID: 0b21b5069fbf1db5bec531630a8d3eee6f1f474d64bb54c6a1c44a3d8e2cc721
                                  • Opcode Fuzzy Hash: bc85fdc09d4fce3dfbe50538f39d64f32c4b6099e2a05669c9b1daebb1f6e385
                                  • Instruction Fuzzy Hash: 2221D372501206ABEB24AB25CC61B7B77ACEB04316F10017BFD01D6663EB78AD49CB58
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                  • EnumSystemLocalesW.KERNEL32(0045107A,00000001,00000000,?,00443EFC,?,004516A7,00000000,?,?,?), ref: 00450FC4
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: 2806d9e87b91580947c38d8a0617f63d2b95e775220bf3e675df36a013b02c7b
                                  • Instruction ID: 451a354658792f2252a151bea30e2a99c0585190810680eeac5085bd3c0c80bb
                                  • Opcode Fuzzy Hash: 2806d9e87b91580947c38d8a0617f63d2b95e775220bf3e675df36a013b02c7b
                                  • Instruction Fuzzy Hash: FD11293B2007019FDB28AF39C8916BABB92FF8435AB14442DE94747B41D7B9B847C744
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451298,00000000,00000000,?), ref: 00451526
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale_abort_free
                                  • String ID:
                                  • API String ID: 2692324296-0
                                  • Opcode ID: e61a00dc03fcb481ae1f4eaad0348555d58099959c5ffac150b0217cf8aecc77
                                  • Instruction ID: d2fe2c3fce417e68b0623dfb5eb434355baf81d8c10f12b7a8aa08190ad777f0
                                  • Opcode Fuzzy Hash: e61a00dc03fcb481ae1f4eaad0348555d58099959c5ffac150b0217cf8aecc77
                                  • Instruction Fuzzy Hash: 4AF0F9326102197BDB289A258C46BBB7758EB80755F04046AEC07A3251FA78FD45C6D4
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                  • EnumSystemLocalesW.KERNEL32(004512CA,00000001,?,?,00443EFC,?,0045166B,00443EFC,?,?,?,?,?,00443EFC,?,?), ref: 00451039
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: 1383e35cddf71846be5f04bfb451628eb58ff654fdb94fb85b79533aadb6d968
                                  • Instruction ID: 969c50ee721750b2a7664082bdad3607fc28c6e2ba06475257799e5d9796a5a7
                                  • Opcode Fuzzy Hash: 1383e35cddf71846be5f04bfb451628eb58ff654fdb94fb85b79533aadb6d968
                                  • Instruction Fuzzy Hash: 19F028363003045FDB245F76DC81B7B7B95EF8075DF04442EFD4187A92D6B99C828604
                                  APIs
                                    • Part of subcall function 00444CDC: EnterCriticalSection.KERNEL32(-00472558,?,0044246B,00000000,0046EAD0,0000000C,00442426,0000000A,?,?,00448949,0000000A,?,00447184,00000001,00000364), ref: 00444CEB
                                  • EnumSystemLocalesW.KERNEL32(00447278,00000001,0046EC58,0000000C), ref: 004472F6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: ce5d864c7127ce76761e0cbea026e968eb5e88cd2d94c9e55423b39c5525c7e8
                                  • Instruction ID: acebf021cc54f47487df9b00313a15cc1bfd22b3d47c3c45ccbcf72c34342655
                                  • Opcode Fuzzy Hash: ce5d864c7127ce76761e0cbea026e968eb5e88cd2d94c9e55423b39c5525c7e8
                                  • Instruction Fuzzy Hash: 97F06236620200DFEB10EF79DE46B5D37E0EB44715F10816AF414DB2A1CBB89981DB4D
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                  • EnumSystemLocalesW.KERNEL32(00450E5E,00000001,?,?,?,004516C9,00443EFC,?,?,?,?,?,00443EFC,?,?,?), ref: 00450F3E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                  • String ID:
                                  • API String ID: 1084509184-0
                                  • Opcode ID: c0752d91e59c0ec8caa35cedbb84099f1f2f8e555a7fabae98b3644acfac0ab5
                                  • Instruction ID: 7585e2e2e927d60b614fbbb7cbec4ece609ea7599c31e6a5607aeddcbc8761df
                                  • Opcode Fuzzy Hash: c0752d91e59c0ec8caa35cedbb84099f1f2f8e555a7fabae98b3644acfac0ab5
                                  • Instruction Fuzzy Hash: 89F0E53A30020557CB28AF35D845B6A7F94EFC1715B16449EFE098B252C67AD886C794
                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00033EEE,00433BBC), ref: 00433EE7
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: e588410f7d772084ad9b5e6a201b2d06307ba3208cc6e1757a1b1bd45e9a1e30
                                  • Instruction ID: 9bcc487b38fe881941be7e97ad5738302595bcb4dafebc2e14986f4c0a09dd7d
                                  • Opcode Fuzzy Hash: e588410f7d772084ad9b5e6a201b2d06307ba3208cc6e1757a1b1bd45e9a1e30
                                  • Instruction Fuzzy Hash:
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: HeapProcess
                                  • String ID:
                                  • API String ID: 54951025-0
                                  • Opcode ID: 92e8274eb45f99ac31ca5a7841fd9c067bc26919afa491827186e59168ab32af
                                  • Instruction ID: 07883168748708d5871df038b293f30180ed36dce4f2d3eb69edcdcf819b44e4
                                  • Opcode Fuzzy Hash: 92e8274eb45f99ac31ca5a7841fd9c067bc26919afa491827186e59168ab32af
                                  • Instruction Fuzzy Hash: 8EA01130202202CBA3008F32AB0A20A3BA8AA00AA23028038A00AC02A0EE2080808A08
                                  APIs
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00417472
                                  • GetProcAddress.KERNEL32(00000000), ref: 00417475
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00417486
                                  • GetProcAddress.KERNEL32(00000000), ref: 00417489
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0041749A
                                  • GetProcAddress.KERNEL32(00000000), ref: 0041749D
                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004174AE
                                  • GetProcAddress.KERNEL32(00000000), ref: 004174B1
                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00417552
                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041756A
                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00417580
                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004175A6
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417626
                                  • TerminateProcess.KERNEL32(?,00000000), ref: 0041763A
                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00417671
                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0041773E
                                  • SetThreadContext.KERNEL32(?,00000000), ref: 0041775B
                                  • ResumeThread.KERNEL32(?), ref: 00417768
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417780
                                  • GetCurrentProcess.KERNEL32(?), ref: 0041778B
                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004177A5
                                  • GetLastError.KERNEL32 ref: 004177AD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                  • API String ID: 4188446516-3035715614
                                  • Opcode ID: ca58d074774f4cb3cec8caed2bdcc8ae3fb1cd477b48ba63cf2103ffe40dc484
                                  • Instruction ID: 9d7e092ec3b05a7a521957261ed1896ff906ab06cfb84d00d3f911d9ff722cfe
                                  • Opcode Fuzzy Hash: ca58d074774f4cb3cec8caed2bdcc8ae3fb1cd477b48ba63cf2103ffe40dc484
                                  • Instruction Fuzzy Hash: C3A16D71508304AFD710DF65CD89B6B7BF8FB48345F00082EF699962A1DB75E884CB6A
                                  APIs
                                    • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                    • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040C3B7
                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040C3E7
                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                    • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                    • Part of subcall function 0041B79A: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C632
                                  • ExitProcess.KERNEL32 ref: 0040C63E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                  • String ID: SG$ SG$ SG$""", 0$")$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$PSG$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                  • API String ID: 1861856835-1415323999
                                  • Opcode ID: 654f7889ed5edaac55a18f8be21b9837d0d7268fd1f2b157d317ae4c17904d16
                                  • Instruction ID: 61d23169d088639e971774d7266815e56d2523c1fe05d3951d40341dc357c42d
                                  • Opcode Fuzzy Hash: 654f7889ed5edaac55a18f8be21b9837d0d7268fd1f2b157d317ae4c17904d16
                                  • Instruction Fuzzy Hash: F891A3316042005AC314FB21D852AAF7799AF90318F50453FF88AB71E2EF7CAD49C69E
                                  APIs
                                    • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                    • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C013
                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C056
                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,00475308,?,pth_unenc), ref: 0040C065
                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                    • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                    • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                    • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C280
                                  • ExitProcess.KERNEL32 ref: 0040C287
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                  • String ID: SG$ SG$")$.vbs$On Error Resume Next$PSG$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("
                                  • API String ID: 3797177996-899740633
                                  • Opcode ID: 6fdf2f18d39eafdca5b1836955c68c779565fa021d6480eae315e8288a497e30
                                  • Instruction ID: 3970d62be7f9f5e1fdb580af11360c5c0218cddba346a3e39168d22276c4a34b
                                  • Opcode Fuzzy Hash: 6fdf2f18d39eafdca5b1836955c68c779565fa021d6480eae315e8288a497e30
                                  • Instruction Fuzzy Hash: 838194316042005BC315FB21D852AAF7799AF91708F10453FF986A72E2EF7C9D49C69E
                                  APIs
                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00475308,?,00000000), ref: 004113AC
                                  • ExitProcess.KERNEL32 ref: 004115F5
                                    • Part of subcall function 00412735: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                    • Part of subcall function 00412735: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                    • Part of subcall function 00412735: RegCloseKey.KERNEL32(00000000), ref: 00412775
                                    • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 00411433
                                  • OpenProcess.KERNEL32(00100000,00000000,,@,?,?,?,?,00000000), ref: 00411442
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 0041144D
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 00411454
                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 0041145A
                                    • Part of subcall function 004128AD: RegCreateKeyA.ADVAPI32(80000001,00000000,TeF), ref: 004128BB
                                    • Part of subcall function 004128AD: RegSetValueExA.KERNEL32(TeF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128D6
                                    • Part of subcall function 004128AD: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004670E0,00000001,000000AF,00466554), ref: 004128E1
                                  • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 0041148B
                                  • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 004114E7
                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411501
                                  • lstrcatW.KERNEL32(?,.exe,?,?,?,?,?,?,?,00000000), ref: 00411513
                                    • Part of subcall function 0041B79A: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B7F6
                                    • Part of subcall function 0041B79A: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B80A
                                    • Part of subcall function 0041B79A: CloseHandle.KERNEL32(00000000), ref: 0041B817
                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041155B
                                  • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 0041159C
                                  • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004115B1
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004115BC
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004115C3
                                  • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004115C9
                                    • Part of subcall function 0041B79A: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466900,00000000,00000000,0040C267,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041B7D9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExecuteExistsExitMutexNamePointerQueryShellSleepWritelstrcat
                                  • String ID: ,@$.exe$0TG$PSG$WDH$exepath$open$temp_
                                  • API String ID: 4250697656-4136069298
                                  • Opcode ID: 57a76233155c5e6f3f5eb151cd316bca093877b01aee461a5fef8088efcefce1
                                  • Instruction ID: 17001e37a1d7cf9a3413e78a7a022695eb621cd558d1591dce66fb7483b9d66c
                                  • Opcode Fuzzy Hash: 57a76233155c5e6f3f5eb151cd316bca093877b01aee461a5fef8088efcefce1
                                  • Instruction Fuzzy Hash: 7551B571A00315BBDB00A7A09C46EFE736E9B44715F10416BF906B71E2EF788E858A9D
                                  APIs
                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A4A8
                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041A4BC
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00466554), ref: 0041A4E4
                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041A4F5
                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041A536
                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041A54E
                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041A563
                                  • SetEvent.KERNEL32 ref: 0041A580
                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A591
                                  • CloseHandle.KERNEL32 ref: 0041A5A1
                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041A5C3
                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041A5CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                  • API String ID: 738084811-2094122233
                                  • Opcode ID: 6cdad7b2072bb7b1f1cf65aa6f0dc65162114e9383cfe1cf391b21bd569ee139
                                  • Instruction ID: 23b594f260307180257043fa1e2d6aa1707bafa700398656917524c484c431be
                                  • Opcode Fuzzy Hash: 6cdad7b2072bb7b1f1cf65aa6f0dc65162114e9383cfe1cf391b21bd569ee139
                                  • Instruction Fuzzy Hash: A251B1716442046AD214BB32EC92EBF3B9DAB90758F10443FF445621E2EE789D48866F
                                  APIs
                                  • _wcslen.LIBCMT ref: 0040BC75
                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750FC,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040BC8E
                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe,00000000,00000000,00000000,00000000,00000000,?,004750FC,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040BD3E
                                  • _wcslen.LIBCMT ref: 0040BD54
                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe,00000000,00000000), ref: 0040BDF2
                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE31
                                  • _wcslen.LIBCMT ref: 0040BE34
                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040BE4B
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750FC,0000000E), ref: 0040BE9B
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000001), ref: 0040BEB9
                                  • ExitProcess.KERNEL32 ref: 0040BED0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                  • String ID: SG$ SG$ SG$ SG$ SG$6$C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe$del$open
                                  • API String ID: 1579085052-636918380
                                  • Opcode ID: a7d6d57d1ad3ded224159505a6611d35dd0400eb66e533863ce6af2c8e10c1ae
                                  • Instruction ID: cada26950b0f91ffbe9684419e497f708478a0192fdd3dd39558b78de3226dfb
                                  • Opcode Fuzzy Hash: a7d6d57d1ad3ded224159505a6611d35dd0400eb66e533863ce6af2c8e10c1ae
                                  • Instruction Fuzzy Hash: 0B51C1316046006BD609B722EC52E7F77889F81719F50443FF985A62E2DF7CAD4582EE
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401C7E
                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401C8E
                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401C9E
                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401CAE
                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401CBE
                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401CCF
                                  • WriteFile.KERNEL32(00000000,00472B02,00000002,00000000,00000000), ref: 00401CE0
                                  • WriteFile.KERNEL32(00000000,00472B04,00000004,00000000,00000000), ref: 00401CF0
                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401D00
                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401D11
                                  • WriteFile.KERNEL32(00000000,00472B0E,00000002,00000000,00000000), ref: 00401D22
                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401D32
                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401D42
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Write$Create
                                  • String ID: RIFF$WAVE$data$fmt
                                  • API String ID: 1602526932-4212202414
                                  • Opcode ID: d86e0a11b62900f44300c56c570c8f4c6d29e182ebfed168058ac3948617b838
                                  • Instruction ID: 459023fa40bd80d73c97eac26e4027242e7445eca248bff5dcea5bec94493f3f
                                  • Opcode Fuzzy Hash: d86e0a11b62900f44300c56c570c8f4c6d29e182ebfed168058ac3948617b838
                                  • Instruction Fuzzy Hash: 85411C726443187AE210DE51DD86FBB7FACEB85B54F40081AF644E6080D7A5E909DBB3
                                  APIs
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe,00000001,004068B2,C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe,00000003,004068DA,004752F0,00406933), ref: 004064F4
                                  • GetProcAddress.KERNEL32(00000000), ref: 004064FD
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 0040650E
                                  • GetProcAddress.KERNEL32(00000000), ref: 00406511
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 00406522
                                  • GetProcAddress.KERNEL32(00000000), ref: 00406525
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00406536
                                  • GetProcAddress.KERNEL32(00000000), ref: 00406539
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 0040654A
                                  • GetProcAddress.KERNEL32(00000000), ref: 0040654D
                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040655E
                                  • GetProcAddress.KERNEL32(00000000), ref: 00406561
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                  • API String ID: 1646373207-3653113000
                                  • Opcode ID: ef23c6471a2b46cbb5b12a679159521cca5d22753a6c35f36816646c352fbe50
                                  • Instruction ID: d8392adca69ca7380431791802c09c3f057f20abbaf47be00649cb9a46baa942
                                  • Opcode Fuzzy Hash: ef23c6471a2b46cbb5b12a679159521cca5d22753a6c35f36816646c352fbe50
                                  • Instruction Fuzzy Hash: D20171A4E40B1635CB206F7B7C94D17AEAC9E503503160837A406F32A1EEBCD400CD7D
                                  APIs
                                  • lstrlenW.KERNEL32(?), ref: 0041B3E1
                                  • _memcmp.LIBVCRUNTIME ref: 0041B3F9
                                  • lstrlenW.KERNEL32(?), ref: 0041B412
                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041B44D
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041B460
                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B4A4
                                  • lstrcmpW.KERNEL32(?,?), ref: 0041B4BF
                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B4D7
                                  • _wcslen.LIBCMT ref: 0041B4E6
                                  • FindVolumeClose.KERNEL32(?), ref: 0041B506
                                  • GetLastError.KERNEL32 ref: 0041B51E
                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B54B
                                  • lstrcatW.KERNEL32(?,?), ref: 0041B564
                                  • lstrcpyW.KERNEL32(?,?), ref: 0041B573
                                  • GetLastError.KERNEL32 ref: 0041B57B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                  • String ID: ?
                                  • API String ID: 3941738427-1684325040
                                  • Opcode ID: e79c6557d7143a0add8a3d203bc3a2cd2385ec013658f048d8e2d2538e26efc1
                                  • Instruction ID: f0577cbf519c1fbc76aa3138d797bbd7c283cc622b072e5c2a83b2d98bec9820
                                  • Opcode Fuzzy Hash: e79c6557d7143a0add8a3d203bc3a2cd2385ec013658f048d8e2d2538e26efc1
                                  • Instruction Fuzzy Hash: 8441A071504705ABC720DF61E8489EBB7E8EB48705F00482FF541D2262EF78D989CBDA
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$EnvironmentVariable$_wcschr
                                  • String ID:
                                  • API String ID: 3899193279-0
                                  • Opcode ID: 0e1a8f8bbfaf70a5321281e28d07a2b80f4a7f922fdb1718459ded84c8fb4435
                                  • Instruction ID: a8aac0df7486383d9a181904d39d16e24afc3d72eb934652fe50c6e09291e228
                                  • Opcode Fuzzy Hash: 0e1a8f8bbfaf70a5321281e28d07a2b80f4a7f922fdb1718459ded84c8fb4435
                                  • Instruction Fuzzy Hash: 5DD12771D00310AFFB21AF77888166E7BA4BF01368F45416FF945A7381EA399E418B9D
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411D72
                                    • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                    • Part of subcall function 0041789C: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00466324), ref: 004178B2
                                    • Part of subcall function 0041789C: CloseHandle.KERNEL32($cF,?,?,00403AB9,00466324), ref: 004178BB
                                  • Sleep.KERNEL32(0000000A,00466324), ref: 00411EC4
                                  • Sleep.KERNEL32(0000000A,00466324,00466324), ref: 00411F66
                                  • Sleep.KERNEL32(0000000A,00466324,00466324,00466324), ref: 00412008
                                  • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 00412069
                                  • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 004120A0
                                  • DeleteFileW.KERNEL32(00000000,00466324,00466324,00466324), ref: 004120DC
                                  • Sleep.KERNEL32(000001F4,00466324,00466324,00466324), ref: 004120F6
                                  • Sleep.KERNEL32(00000064), ref: 00412138
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                  • String ID: /stext "$HTG$HTG$NG$NG
                                  • API String ID: 1223786279-556891652
                                  • Opcode ID: 608ad779d3f05872a2fb421b20f7995dfcf2a6a41ae2f7ba8b1188b624d33fb6
                                  • Instruction ID: b666a026b41db1aee680f36e7b950d376c2ae40a85d54f66cdb5da2431d4b1f1
                                  • Opcode Fuzzy Hash: 608ad779d3f05872a2fb421b20f7995dfcf2a6a41ae2f7ba8b1188b624d33fb6
                                  • Instruction Fuzzy Hash: F00224315083414AD324FB61D891BEFB7D5AFD4308F50493EF88A931E2EF785A49C69A
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413F5E
                                  • LoadLibraryA.KERNEL32(?), ref: 00413FA0
                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00413FC0
                                  • FreeLibrary.KERNEL32(00000000), ref: 00413FC7
                                  • LoadLibraryA.KERNEL32(?), ref: 00413FFF
                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414011
                                  • FreeLibrary.KERNEL32(00000000), ref: 00414018
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414027
                                  • FreeLibrary.KERNEL32(00000000), ref: 0041403E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                  • API String ID: 2490988753-744132762
                                  • Opcode ID: a1ebb0e7ad90273c6050595515f5be941597b1bff8e5ee6fc120c50391cee153
                                  • Instruction ID: be6955175b5ce73d91635d8a52bfbd354ab09fdd92d7e760b1966c561f7cb5d0
                                  • Opcode Fuzzy Hash: a1ebb0e7ad90273c6050595515f5be941597b1bff8e5ee6fc120c50391cee153
                                  • Instruction Fuzzy Hash: B33117B280131567D320EF55DC84EDB7BDCAF89745F01092AFA88A3201D73CD98587AE
                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041BA51
                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041BA95
                                  • RegCloseKey.ADVAPI32(?), ref: 0041BD5F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumOpen
                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                  • API String ID: 1332880857-3714951968
                                  • Opcode ID: 3efd418213305a701cb68e843df2402042726612c0cd2b9edffbb1664b23c096
                                  • Instruction ID: 1bcbf0a3cc417a03c0c35e29071d92a42b6db1fb54f2f7a4c144fc0fa0a0a3c2
                                  • Opcode Fuzzy Hash: 3efd418213305a701cb68e843df2402042726612c0cd2b9edffbb1664b23c096
                                  • Instruction Fuzzy Hash: 43813F311082409FD324EB11D951AEFB7E8FFD4314F10493FB586921E1EF34AA59CA9A
                                  APIs
                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041CCF4
                                  • GetCursorPos.USER32(?), ref: 0041CD03
                                  • SetForegroundWindow.USER32(?), ref: 0041CD0C
                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CD26
                                  • Shell_NotifyIconA.SHELL32(00000002,00474B50), ref: 0041CD77
                                  • ExitProcess.KERNEL32 ref: 0041CD7F
                                  • CreatePopupMenu.USER32 ref: 0041CD85
                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041CD9A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                  • String ID: Close
                                  • API String ID: 1657328048-3535843008
                                  • Opcode ID: bed582d39fc96e8479943e4d89b527f8ff9ef20370aed2009df63d45acb158b0
                                  • Instruction ID: 460fc807693895ecf387abb2373bcbc61375cccb84b7011694e880842115b21a
                                  • Opcode Fuzzy Hash: bed582d39fc96e8479943e4d89b527f8ff9ef20370aed2009df63d45acb158b0
                                  • Instruction Fuzzy Hash: F321F831140205EFDB054FA4FD4DBAA3F65EB04702F004539FA0AA41B1DBB6ED91EB59
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$Info
                                  • String ID:
                                  • API String ID: 2509303402-0
                                  • Opcode ID: 39c5139744f4540f523a9af4ed2fa8afb712fe0565144d4bd577e3f50ea1b080
                                  • Instruction ID: de18a1b700a064f56ed707831433d851a0809218b1b1d193042f08ca5b0df7c8
                                  • Opcode Fuzzy Hash: 39c5139744f4540f523a9af4ed2fa8afb712fe0565144d4bd577e3f50ea1b080
                                  • Instruction Fuzzy Hash: 59B190719006059FEF11DF69C881BEEBBF4FF09304F14406EF895AB252DA799C459B24
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00407F4C
                                  • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                  • __aulldiv.LIBCMT ref: 00407FE9
                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                  • CloseHandle.KERNEL32(00000000), ref: 00408200
                                  • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                  • CloseHandle.KERNEL32(00000000), ref: 00408256
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreatePointerReadSize__aulldiv
                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                  • API String ID: 1884690901-2582957567
                                  • Opcode ID: ec4e0d5317ee6db51cf61ba48dd6986dc2dc21271ea4f960ed56e36754342467
                                  • Instruction ID: fe8c5194ffe86d3827a7b181bfbb3d0fd3c62202293e6b84b2d5449ede98e066
                                  • Opcode Fuzzy Hash: ec4e0d5317ee6db51cf61ba48dd6986dc2dc21271ea4f960ed56e36754342467
                                  • Instruction Fuzzy Hash: 73B182716083409BC614FB25C892BAFB7E5AFD4314F40492EF889632D2EF789945C79B
                                  APIs
                                  • ___free_lconv_mon.LIBCMT ref: 004502C1
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F510
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F522
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F534
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F546
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F558
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F56A
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F57C
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F58E
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5A0
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5B2
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5C4
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5D6
                                    • Part of subcall function 0044F4F3: _free.LIBCMT ref: 0044F5E8
                                  • _free.LIBCMT ref: 004502B6
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  • _free.LIBCMT ref: 004502D8
                                  • _free.LIBCMT ref: 004502ED
                                  • _free.LIBCMT ref: 004502F8
                                  • _free.LIBCMT ref: 0045031A
                                  • _free.LIBCMT ref: 0045032D
                                  • _free.LIBCMT ref: 0045033B
                                  • _free.LIBCMT ref: 00450346
                                  • _free.LIBCMT ref: 0045037E
                                  • _free.LIBCMT ref: 00450385
                                  • _free.LIBCMT ref: 004503A2
                                  • _free.LIBCMT ref: 004503BA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                  • String ID:
                                  • API String ID: 161543041-0
                                  • Opcode ID: 0aefceb04b648aea5efd53e91dec8318d050154b6956abd82aee10787160205d
                                  • Instruction ID: 8d5a52dc196ca223d521196e0170462af54da78aea2ffa7a7b46d1c1532e12ca
                                  • Opcode Fuzzy Hash: 0aefceb04b648aea5efd53e91dec8318d050154b6956abd82aee10787160205d
                                  • Instruction Fuzzy Hash: 57316F355003009FEB20AA79D84AB5B73E9EF01365F51445FF88AD7652DF38AC48D719
                                  APIs
                                    • Part of subcall function 00411771: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                    • Part of subcall function 00411771: WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                    • Part of subcall function 00412735: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,00475308), ref: 00412751
                                    • Part of subcall function 00412735: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0041276A
                                    • Part of subcall function 00412735: RegCloseKey.KERNEL32(00000000), ref: 00412775
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466900,00466900,00000000), ref: 0040C826
                                  • ExitProcess.KERNEL32 ref: 0040C832
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                  • String ID: """, 0$.vbs$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$PSG$Temp$exepath$open
                                  • API String ID: 1913171305-1605470806
                                  • Opcode ID: 0e6254cfd11fd0719da03c2ec8444806ffe6fa9b88c261795a14bdbbed94e080
                                  • Instruction ID: 0a59ab1ac2652dc6c4b0de1f1bfb113b457f9f33def171b9a9917dadcc9857af
                                  • Opcode Fuzzy Hash: 0e6254cfd11fd0719da03c2ec8444806ffe6fa9b88c261795a14bdbbed94e080
                                  • Instruction Fuzzy Hash: 2E416D329101185ACB14F761DC56DFE7779AF50708F10417FF806B31E2EE786A8ACA98
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: b030283a6c0ce51ba92dd09d555ed862ebb201d4cb761b5ee972a13664eb7e13
                                  • Instruction ID: 986e8a668492dbee8f9f46891c6c86f5dcf9ebf43b9fca0c5b911ed3811bef24
                                  • Opcode Fuzzy Hash: b030283a6c0ce51ba92dd09d555ed862ebb201d4cb761b5ee972a13664eb7e13
                                  • Instruction Fuzzy Hash: 1FC15371D40204BBEB20EAA8CC82FEE77B89B08704F15416AFE45FB282D6749D459768
                                  APIs
                                  • WaitForSingleObject.KERNEL32(0040466D,000000FF,00000000,?,?,00000000,?,0040466D,00000000,?,?), ref: 004047FD
                                  • SetEvent.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404808
                                  • CloseHandle.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404811
                                  • closesocket.WS2_32(000000FF), ref: 0040481F
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,?,0040466D,00000000,?,?), ref: 00404856
                                  • SetEvent.KERNEL32(00000000,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404867
                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 0040486E
                                  • SetEvent.KERNEL32(?,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404880
                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 00404885
                                  • CloseHandle.KERNEL32(?,?,00000000,?,0040466D,00000000,?,?,?,00000000), ref: 0040488A
                                  • SetEvent.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?), ref: 00404895
                                  • CloseHandle.KERNEL32(0040466D,?,00000000,?,0040466D,00000000,?,?), ref: 0040489A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                  • String ID:
                                  • API String ID: 3658366068-0
                                  • Opcode ID: e2db301fcad4624b7263a524b2eba2d344f633f08cd73d808afccc2cf0cb2889
                                  • Instruction ID: bab6184e8302d1d457a53eef1949a11c31841f7ba2aeead181e9cd14b25d2afd
                                  • Opcode Fuzzy Hash: e2db301fcad4624b7263a524b2eba2d344f633f08cd73d808afccc2cf0cb2889
                                  • Instruction Fuzzy Hash: 21212C71100F149FC6216B26DC05A17BBE1EF40325F104A6EE2A622AF2CF35F851DB4C
                                  APIs
                                    • Part of subcall function 00454860: CreateFileW.KERNEL32(00000000,?,?,;LE,?,?,00000000,?,00454C3B,00000000,0000000C), ref: 0045487D
                                  • GetLastError.KERNEL32 ref: 00454CA6
                                  • __dosmaperr.LIBCMT ref: 00454CAD
                                  • GetFileType.KERNEL32(00000000), ref: 00454CB9
                                  • GetLastError.KERNEL32 ref: 00454CC3
                                  • __dosmaperr.LIBCMT ref: 00454CCC
                                  • CloseHandle.KERNEL32(00000000), ref: 00454CEC
                                  • CloseHandle.KERNEL32(?), ref: 00454E36
                                  • GetLastError.KERNEL32 ref: 00454E68
                                  • __dosmaperr.LIBCMT ref: 00454E6F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                  • String ID: H
                                  • API String ID: 4237864984-2852464175
                                  • Opcode ID: 7241ecee4a5f1f89fc763009d89c6ec11b2c57897b1f7dc41199f6beedf99759
                                  • Instruction ID: a1ee14646c220e05fb339a94c39d658440f80e8cb8884f5184f0ba1168eb6fd8
                                  • Opcode Fuzzy Hash: 7241ecee4a5f1f89fc763009d89c6ec11b2c57897b1f7dc41199f6beedf99759
                                  • Instruction Fuzzy Hash: EBA126319045489FDF19DF68D8427AE7BB1EB46329F14015EEC01AF392CB398896CB5A
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 00419323
                                  • GdiplusStartup.GDIPLUS(00474AF4,?,00000000), ref: 00419355
                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004193E1
                                  • Sleep.KERNEL32(000003E8), ref: 00419463
                                  • GetLocalTime.KERNEL32(?), ref: 00419472
                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041955B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$VG$VG
                                  • API String ID: 489098229-455837001
                                  • Opcode ID: 9f9be5d73908092905350f8d6be77be6132ee5e04cd9351ebf74e9d7e7752075
                                  • Instruction ID: fd6a6a94d4e700b4a78141c9ee43bb9ee9cebd21b8d39b126fa21a823fd8be24
                                  • Opcode Fuzzy Hash: 9f9be5d73908092905350f8d6be77be6132ee5e04cd9351ebf74e9d7e7752075
                                  • Instruction Fuzzy Hash: 9F517B71A002449ACB14BBB5C866AFE7BA9AB55308F40403FF845B71D2EF3C5E85C799
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 65535$udp
                                  • API String ID: 0-1267037602
                                  • Opcode ID: ca54308d78d3c4eee7f7b8de95e44a5f1974b5ba6ce0b2e83d9cd08af329ba0f
                                  • Instruction ID: c3bfc2202edcb816331f8b78e042012e01f064b481147a6b300cfea58c86e196
                                  • Opcode Fuzzy Hash: ca54308d78d3c4eee7f7b8de95e44a5f1974b5ba6ce0b2e83d9cd08af329ba0f
                                  • Instruction Fuzzy Hash: E241F4716093029BD7209F28D905BBB3BA4EB84742F04042FF98593391EB6DDEC1866E
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004395C9
                                  • GetLastError.KERNEL32(?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 004395D6
                                  • __dosmaperr.LIBCMT ref: 004395DD
                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439609
                                  • GetLastError.KERNEL32(?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439613
                                  • __dosmaperr.LIBCMT ref: 0043961A
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401AD8,?), ref: 0043965D
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401AD8,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 00439667
                                  • __dosmaperr.LIBCMT ref: 0043966E
                                  • _free.LIBCMT ref: 0043967A
                                  • _free.LIBCMT ref: 00439681
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                  • String ID:
                                  • API String ID: 2441525078-0
                                  • Opcode ID: 7d25b48f924a9fae5a5881453bd469cfe57fd0c2e6412707544dbbd620f0408d
                                  • Instruction ID: 4e2bc3e06b1619faa1414a7a2c806c5d1514cda6e297fdc8b1054bbcfea92265
                                  • Opcode Fuzzy Hash: 7d25b48f924a9fae5a5881453bd469cfe57fd0c2e6412707544dbbd620f0408d
                                  • Instruction Fuzzy Hash: D431E27280560ABFDF11AFA5DC459AF3B68EF09324F10015EF81066251DB39CD50DBAA
                                  APIs
                                  • SetEvent.KERNEL32(?,?), ref: 00404E71
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                  • TranslateMessage.USER32(?), ref: 00404F30
                                  • DispatchMessageA.USER32(?), ref: 00404F3B
                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00404FF3
                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                  • API String ID: 2956720200-749203953
                                  • Opcode ID: 1295ec8e36243f98cadcd04087525a0f6d30f5080800e4555915d39d6ef7306e
                                  • Instruction ID: 290a0909c372499a911e5ffd519e5407deecd3e64339803c74491ead196e324c
                                  • Opcode Fuzzy Hash: 1295ec8e36243f98cadcd04087525a0f6d30f5080800e4555915d39d6ef7306e
                                  • Instruction Fuzzy Hash: A441B1726043016BC614FB75DC568AF7BA8ABC1714F00093EF906A31E6EF38DA05C79A
                                  APIs
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00466554), ref: 0041710A
                                  • CloseHandle.KERNEL32(00000000), ref: 00417113
                                  • DeleteFileA.KERNEL32(00000000), ref: 00417122
                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 004170D6
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                  • String ID: <$@$HVG$HVG$Temp
                                  • API String ID: 1107811701-2568817187
                                  • Opcode ID: 49b2793fd4fb0bfedd157a3dfc6a5d0807558cb51ec49c987588f81380459670
                                  • Instruction ID: 91e4b2e714ed18abe86730f534b33d619c8c8851ecafca63038a632c75497fc1
                                  • Opcode Fuzzy Hash: 49b2793fd4fb0bfedd157a3dfc6a5d0807558cb51ec49c987588f81380459670
                                  • Instruction Fuzzy Hash: 00319C31A00209ABCB04FBA1DC56AEE7775AF50308F40417EF506761E2EF785A89CB99
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419E8A
                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EA1
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EAE
                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419EBD
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419ECE
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,004197EE,00000000,00000000), ref: 00419ED1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: fd4b3df9065e7dfd6d4a697e6f6a53e43d0cc3b02fd87625ee99f2ecddb25ff7
                                  • Instruction ID: 401ec45fa9dd23e1a78cca63bf6ad54db5d4c9b9326c405a7ffc92fc58cb3c60
                                  • Opcode Fuzzy Hash: fd4b3df9065e7dfd6d4a697e6f6a53e43d0cc3b02fd87625ee99f2ecddb25ff7
                                  • Instruction Fuzzy Hash: 4211A331941218BBD711AB64DC85DFF3B6CDB45BA1B05002AF902A21D2DF64CD4A9AB5
                                  APIs
                                  • _free.LIBCMT ref: 00446FEF
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  • _free.LIBCMT ref: 00446FFB
                                  • _free.LIBCMT ref: 00447006
                                  • _free.LIBCMT ref: 00447011
                                  • _free.LIBCMT ref: 0044701C
                                  • _free.LIBCMT ref: 00447027
                                  • _free.LIBCMT ref: 00447032
                                  • _free.LIBCMT ref: 0044703D
                                  • _free.LIBCMT ref: 00447048
                                  • _free.LIBCMT ref: 00447056
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 6cab9f7d569f345c7814ae43f5c160195df6b64f63ea78a6b18b8aa73aee7787
                                  • Instruction ID: 9fec27c2adf71536e74eabd4120179072dbaa777ef3671cded9c13d0800a1e4b
                                  • Opcode Fuzzy Hash: 6cab9f7d569f345c7814ae43f5c160195df6b64f63ea78a6b18b8aa73aee7787
                                  • Instruction Fuzzy Hash: 86119B7550011CBFDB05EF55C882CDD3BB5EF05364B9240AAF9494F222DA35DE50EB49
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Eventinet_ntoa
                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                  • API String ID: 3578746661-3604713145
                                  • Opcode ID: 7b7cad720aec6dcac55c86159f4ba6ce004c0f2feb5086f5f477b25b5e77307c
                                  • Instruction ID: 73c74054356758d85ec5353b0407031f458931cc5dd6312d5a4dd957febfbb04
                                  • Opcode Fuzzy Hash: 7b7cad720aec6dcac55c86159f4ba6ce004c0f2feb5086f5f477b25b5e77307c
                                  • Instruction Fuzzy Hash: 5851A4316043005BCA14FB75D95AAAE36A59B84318F00453FF809972E1DFBC9D85C78E
                                  APIs
                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,00455FBF), ref: 0045536C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DecodePointer
                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                  • API String ID: 3527080286-3064271455
                                  • Opcode ID: fcb8f87b81c24025c8faa1ed3748b23e21aaaa522dc2b9ab90eaf932e2f1aeea
                                  • Instruction ID: 83316d2fa1d48b2f4155984bd6892a75fd3c5afb36d5e99e95f82d48d48c5a2a
                                  • Opcode Fuzzy Hash: fcb8f87b81c24025c8faa1ed3748b23e21aaaa522dc2b9ab90eaf932e2f1aeea
                                  • Instruction Fuzzy Hash: 93516C70900A09DBCF10DF58D5581BDBBB0FB0A306F204197DC81A7326DB798A6C8B1E
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00416842
                                    • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                  • Sleep.KERNEL32(00000064), ref: 0041686E
                                  • DeleteFileW.KERNEL32(00000000), ref: 004168A2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreateDeleteExecuteShellSleep
                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                  • API String ID: 1462127192-2001430897
                                  • Opcode ID: 78dd33abf2884f810a7e72361485d7cfc0b09768de528c2206b505d279b8ba2d
                                  • Instruction ID: c4be9e9118a59201799f54b99a9a171b680bb642a7e99c3b30ff6139130205e5
                                  • Opcode Fuzzy Hash: 78dd33abf2884f810a7e72361485d7cfc0b09768de528c2206b505d279b8ba2d
                                  • Instruction Fuzzy Hash: 1B313E719001189ADB04FBA1DC96EEE7764AF50708F00417FF946730D2EF786A8ACA9D
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00475A50,00000000,004752F0,00003000,00000004,00000000,00000001), ref: 00406647
                                  • GetCurrentProcess.KERNEL32(00475A50,00000000,00008000,?,00000000,00000001,00000000,004068BB,C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe), ref: 00406705
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentProcess
                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                  • API String ID: 2050909247-4242073005
                                  • Opcode ID: 3d4dde61fac8f932cecf13147f1715ad91c8a5d9075df555c2e0fc840e87cdfb
                                  • Instruction ID: 2a8ac338152687dbadce55b3d6de3572d7837fd421bef744f3a625c24d449dc1
                                  • Opcode Fuzzy Hash: 3d4dde61fac8f932cecf13147f1715ad91c8a5d9075df555c2e0fc840e87cdfb
                                  • Instruction Fuzzy Hash: B231B671600700AFD300AF65DC8AF5677A8FB44709F11053EF50ABB6E1EBB9A8548B6D
                                  APIs
                                  • _strftime.LIBCMT ref: 00401AD3
                                    • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                  • waveInUnprepareHeader.WINMM(00472AC0,00000020,00000000,?), ref: 00401B85
                                  • waveInPrepareHeader.WINMM(00472AC0,00000020), ref: 00401BC3
                                  • waveInAddBuffer.WINMM(00472AC0,00000020), ref: 00401BD2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                  • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                  • API String ID: 3809562944-243156785
                                  • Opcode ID: 79247b94fc76ef65d7255bd27e7b2992fd07bc3911e05f814a85dbf418cf17d5
                                  • Instruction ID: b0e15ff03f11dcb3e5bfd7c1448581b7ace3962aa9bffbd159c0990beee9d81b
                                  • Opcode Fuzzy Hash: 79247b94fc76ef65d7255bd27e7b2992fd07bc3911e05f814a85dbf418cf17d5
                                  • Instruction Fuzzy Hash: 7E315E315043019FC324EB21DC56A9E77A4FB94314F00493EF559A21F1EFB8AA89CB9A
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041CB93
                                    • Part of subcall function 0041CC2A: RegisterClassExA.USER32(00000030), ref: 0041CC77
                                    • Part of subcall function 0041CC2A: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CC92
                                    • Part of subcall function 0041CC2A: GetLastError.KERNEL32 ref: 0041CC9C
                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041CBCA
                                  • lstrcpynA.KERNEL32(00474B68,Remcos,00000080), ref: 0041CBE4
                                  • Shell_NotifyIconA.SHELL32(00000000,00474B50), ref: 0041CBFA
                                  • TranslateMessage.USER32(?), ref: 0041CC06
                                  • DispatchMessageA.USER32(?), ref: 0041CC10
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CC1D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                  • String ID: Remcos
                                  • API String ID: 1970332568-165870891
                                  • Opcode ID: 7a949f86bc247f3cbdd076edfe2cda77560b6c3ffe772df9fdb29a851d56ec4a
                                  • Instruction ID: 6591afd7fea275f101bd811abb8745f55115b26a2df550b070e187602390ba30
                                  • Opcode Fuzzy Hash: 7a949f86bc247f3cbdd076edfe2cda77560b6c3ffe772df9fdb29a851d56ec4a
                                  • Instruction Fuzzy Hash: 130112B1940344ABD7109BA5EC4DFEABBBCA7C5B05F004029E615A2061EFB8E585CB6D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b79e0bacf68e79f56bbfbff6a95aeb92d11d955db7cfd18af0a5c0e52fbe5259
                                  • Instruction ID: 8081305e108bfff8a8e14cd18a234b42858a69a1a1930647e7f2335dd99175ec
                                  • Opcode Fuzzy Hash: b79e0bacf68e79f56bbfbff6a95aeb92d11d955db7cfd18af0a5c0e52fbe5259
                                  • Instruction Fuzzy Hash: 44C105B0D04249AFEF11DFA9C8417BEBBB4EF09314F04415AE544A7392C738D941CBA9
                                  APIs
                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00453013,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452DE6
                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452E69
                                  • __alloca_probe_16.LIBCMT ref: 00452EA1
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00453013,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452EFC
                                  • __alloca_probe_16.LIBCMT ref: 00452F4B
                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452F13
                                    • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00453013,00000000,00000000,?,00000001,?,?,?,?), ref: 00452F8F
                                  • __freea.LIBCMT ref: 00452FBA
                                  • __freea.LIBCMT ref: 00452FC6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                  • String ID:
                                  • API String ID: 201697637-0
                                  • Opcode ID: 636d8ee8978a4b28d28c899fe5287c94f7ea3d2e518637072967bc6aea0c1ce5
                                  • Instruction ID: e285173fe66e9ab68cc8b5f7bb46492c032c90826bba7407019ac45f59d87ef3
                                  • Opcode Fuzzy Hash: 636d8ee8978a4b28d28c899fe5287c94f7ea3d2e518637072967bc6aea0c1ce5
                                  • Instruction Fuzzy Hash: E991D572E002169BDF208E64DA41AEFBBB5AF0A312F14055BFC05E7242D778DC48C768
                                  APIs
                                    • Part of subcall function 004470CF: GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                    • Part of subcall function 004470CF: _free.LIBCMT ref: 00447106
                                    • Part of subcall function 004470CF: SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                    • Part of subcall function 004470CF: _abort.LIBCMT ref: 0044714D
                                  • _memcmp.LIBVCRUNTIME ref: 004448B3
                                  • _free.LIBCMT ref: 00444924
                                  • _free.LIBCMT ref: 0044493D
                                  • _free.LIBCMT ref: 0044496F
                                  • _free.LIBCMT ref: 00444978
                                  • _free.LIBCMT ref: 00444984
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorLast$_abort_memcmp
                                  • String ID: C
                                  • API String ID: 1679612858-1037565863
                                  • Opcode ID: abd95adb81c550f409ae5c5119100e906ed8d0f865db868ac1378bf86e803171
                                  • Instruction ID: ce46d41f1d9e01bafc0896c2bb0d2adb680072b6a59d341745b23d3028246374
                                  • Opcode Fuzzy Hash: abd95adb81c550f409ae5c5119100e906ed8d0f865db868ac1378bf86e803171
                                  • Instruction Fuzzy Hash: 24B14975A012199FEB24DF18C884BAEB7B4FF49314F1045AEE849A7351D738AE90CF48
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: tcp$udp
                                  • API String ID: 0-3725065008
                                  • Opcode ID: af4d639371690cb8637a3a63659cf8324f890a8ac4b6ebd8bb2dc9423f2fa13d
                                  • Instruction ID: 641150f3fd0ea6af627c79cdc5c75230aa36f57d28899e04d0661f3c05bf373f
                                  • Opcode Fuzzy Hash: af4d639371690cb8637a3a63659cf8324f890a8ac4b6ebd8bb2dc9423f2fa13d
                                  • Instruction Fuzzy Hash: 0D71D1716083528FDB24CF1994846ABB7E0AF84746F14442FF885A7352E77CDE81CB8A
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00466454,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C38
                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0,?,?,?,00000000,00407273,00000000,?,0000000A,00000000), ref: 00406C80
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,00407273,00000000,?,0000000A,00000000,00000000), ref: 00406CC0
                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D08
                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,0000000A,00000000,00000000), ref: 00406D18
                                    • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?,?), ref: 0040456A
                                    • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,?,0040460E,00000000,?,?), ref: 00404588
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                  • String ID: .part
                                  • API String ID: 1303771098-3499674018
                                  • Opcode ID: 857a5de1e36b0c99e5fcaddd662611590a652c3b5d8b29b265f96ceecfea8a93
                                  • Instruction ID: 7eae26b3d9efd85ab9a821acf87acbbc445967fcd6ce231ca79d13f55b5b668b
                                  • Opcode Fuzzy Hash: 857a5de1e36b0c99e5fcaddd662611590a652c3b5d8b29b265f96ceecfea8a93
                                  • Instruction Fuzzy Hash: C631A4715083019FD210EF21DD459AFB7A8FB84755F40093EF9C6B21A1DF38AA48CB9A
                                  APIs
                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                  • waveInOpen.WINMM(00472AF8,000000FF,00472B00,Function_00001A8E,00000000,00000000,00000024), ref: 00401A11
                                  • waveInPrepareHeader.WINMM(00472AC0,00000020,00000000), ref: 00401A66
                                  • waveInAddBuffer.WINMM(00472AC0,00000020), ref: 00401A75
                                  • waveInStart.WINMM ref: 00401A81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                  • String ID: dMG$|MG
                                  • API String ID: 1356121797-1683252805
                                  • Opcode ID: 90184a660b4496401ca2bd395970f68dae25d6e8355fffeefbf0e1e22ce1cb2f
                                  • Instruction ID: 140f40b68b7a2e7574469051551963e155d477b90c1392cdc23a62cf20397fe9
                                  • Opcode Fuzzy Hash: 90184a660b4496401ca2bd395970f68dae25d6e8355fffeefbf0e1e22ce1cb2f
                                  • Instruction Fuzzy Hash: 52215C316002019BC725DF66EE1996A7BA6FB84710B00883EF50DE76B0DBF898C0CB5C
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,0043D774,0043D774,?,?,?,00449DB1,00000001,00000001,1AE85006), ref: 00449BBA
                                  • __alloca_probe_16.LIBCMT ref: 00449BF2
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00449DB1,00000001,00000001,1AE85006,?,?,?), ref: 00449C40
                                  • __alloca_probe_16.LIBCMT ref: 00449CD7
                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,1AE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449D3A
                                  • __freea.LIBCMT ref: 00449D47
                                    • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                  • __freea.LIBCMT ref: 00449D50
                                  • __freea.LIBCMT ref: 00449D75
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                  • String ID:
                                  • API String ID: 3864826663-0
                                  • Opcode ID: 45550f184a61a9f8ddf17f24dc0c1f131df532b020593bc4805c091103afbf88
                                  • Instruction ID: b9264d00d576e3e69c3e593975f72d59ef517f4fd458bc34bb1ef2c80a576446
                                  • Opcode Fuzzy Hash: 45550f184a61a9f8ddf17f24dc0c1f131df532b020593bc4805c091103afbf88
                                  • Instruction Fuzzy Hash: 3651F8B2A10206AFFB258F65DC82EBF77A9EB44754F15462EFC05DB240EB38DC409658
                                  APIs
                                  • SendInput.USER32 ref: 00418CFE
                                  • SendInput.USER32(00000001,?,0000001C), ref: 00418D26
                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D4D
                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D6B
                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418D8B
                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418DB0
                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00418DD2
                                  • SendInput.USER32(00000001,?,0000001C), ref: 00418DF5
                                    • Part of subcall function 00418CA7: MapVirtualKeyA.USER32(00000000,00000000), ref: 00418CAD
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InputSend$Virtual
                                  • String ID:
                                  • API String ID: 1167301434-0
                                  • Opcode ID: 03d106074c487e793b96b2f05eb270ad55284c326fdeb905245ef2a17d2a5417
                                  • Instruction ID: 141eef32e971302722b3407f09031bac5ba220a7556c2b6a6b809b2d6bbc12e7
                                  • Opcode Fuzzy Hash: 03d106074c487e793b96b2f05eb270ad55284c326fdeb905245ef2a17d2a5417
                                  • Instruction Fuzzy Hash: 2D318031258349A9E210DF65DC41FDFBBECAFC9B08F04080FB58457191EAA4858C87AB
                                  APIs
                                  • OpenClipboard.USER32 ref: 00415BDE
                                  • EmptyClipboard.USER32 ref: 00415BEC
                                  • CloseClipboard.USER32 ref: 00415BF2
                                  • OpenClipboard.USER32 ref: 00415BF9
                                  • GetClipboardData.USER32(0000000D), ref: 00415C09
                                  • GlobalLock.KERNEL32(00000000), ref: 00415C12
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00415C1B
                                  • CloseClipboard.USER32 ref: 00415C21
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                  • String ID:
                                  • API String ID: 2172192267-0
                                  • Opcode ID: bf20fe329199a8e34afe0003246c911adf149e6994b4918492a0dc0ec0b93d4d
                                  • Instruction ID: 369576e1793333014f6cd695595c81a654a0099a6e7e621b1e9fba3c04e1709a
                                  • Opcode Fuzzy Hash: bf20fe329199a8e34afe0003246c911adf149e6994b4918492a0dc0ec0b93d4d
                                  • Instruction Fuzzy Hash: EE0152322003009FC350BF71DC59AAE77A5AF80B42F00443FFD06A61A2EF35C949C659
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16
                                  • String ID: a/p$am/pm$hD
                                  • API String ID: 3509577899-3668228793
                                  • Opcode ID: 44ea5ac924aea223c25ec6af7a156dea15db996b08b3c9c3fe5b3e61d2d79652
                                  • Instruction ID: deb853d5fd6adf3918d69246e21912660bd894b39407ab32d9d7da7685977c7a
                                  • Opcode Fuzzy Hash: 44ea5ac924aea223c25ec6af7a156dea15db996b08b3c9c3fe5b3e61d2d79652
                                  • Instruction Fuzzy Hash: 1CD111719002069AFB289F68C9857BBB7B0FF06708F26415BE9019B355D33D9D81CB6B
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: 1d80ecd898b2873860388bfd90a69a91c38572b88f559cfcb1da031a1a01905e
                                  • Instruction ID: 0b2e84c71dbf843dbcc2e99f9f8dbab27ea7d8a4e4ef3fbdb467abc62f582456
                                  • Opcode Fuzzy Hash: 1d80ecd898b2873860388bfd90a69a91c38572b88f559cfcb1da031a1a01905e
                                  • Instruction Fuzzy Hash: E061E271D00244AFEB20DF69C842BAABBF4EB4A320F24407BED45EB251D734AD45DB58
                                  APIs
                                    • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                  • _free.LIBCMT ref: 00444296
                                  • _free.LIBCMT ref: 004442AD
                                  • _free.LIBCMT ref: 004442CC
                                  • _free.LIBCMT ref: 004442E7
                                  • _free.LIBCMT ref: 004442FE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$AllocateHeap
                                  • String ID: Z9D
                                  • API String ID: 3033488037-3781130823
                                  • Opcode ID: 1e396c4f324de9ddb7b01a7129941a49517c4d4e7f7401902ff7e7d19c1db4b4
                                  • Instruction ID: 86c8eacfe83d9672290f1135950403671a27bde0e5aa55c461cabd1b4ee88ac5
                                  • Opcode Fuzzy Hash: 1e396c4f324de9ddb7b01a7129941a49517c4d4e7f7401902ff7e7d19c1db4b4
                                  • Instruction Fuzzy Hash: D551B171A00304AFEB20DF6AC881B6A77F4FF95724B1446AEF809D7650E779DA01CB48
                                  APIs
                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045E478), ref: 00448289
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0047279C,000000FF,00000000,0000003F,00000000,?,?), ref: 00448301
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727F0,000000FF,?,0000003F,00000000,?), ref: 0044832E
                                  • _free.LIBCMT ref: 00448277
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  • _free.LIBCMT ref: 00448443
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                  • String ID: xE
                                  • API String ID: 1286116820-407097786
                                  • Opcode ID: 1f630aa574f8f032912558e332746922b811222e22d4e5e5c8fa9a473f36de46
                                  • Instruction ID: 82a604bb7294b81f3f73b5ad664ce4632eb81d562d18d3de5c52697f85b56542
                                  • Opcode Fuzzy Hash: 1f630aa574f8f032912558e332746922b811222e22d4e5e5c8fa9a473f36de46
                                  • Instruction Fuzzy Hash: 43510871900219ABEB14EF698D819AE77BCEF44B14F1002AFF854A3291EF788D418B5C
                                  APIs
                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0044AA48,?,00000000,00000000,00000000,00000000,0000000C), ref: 0044A315
                                  • __fassign.LIBCMT ref: 0044A390
                                  • __fassign.LIBCMT ref: 0044A3AB
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0044A3D1
                                  • WriteFile.KERNEL32(?,00000000,00000000,0044AA48,00000000,?,?,?,?,?,?,?,?,?,0044AA48,?), ref: 0044A3F0
                                  • WriteFile.KERNEL32(?,?,00000001,0044AA48,00000000,?,?,?,?,?,?,?,?,?,0044AA48,?), ref: 0044A429
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                  • String ID:
                                  • API String ID: 1324828854-0
                                  • Opcode ID: 19793b4b6baa09b5fac30a83039e1f9c1b1fc09f5707b87a30c95e6118fc2717
                                  • Instruction ID: 781c03a50f1c813746d4e14bf3c61566c92396d5579059589c4d950ed669b936
                                  • Opcode Fuzzy Hash: 19793b4b6baa09b5fac30a83039e1f9c1b1fc09f5707b87a30c95e6118fc2717
                                  • Instruction Fuzzy Hash: 6551C474E002499FDB10CFA8D845AEEBBF4EF09300F14412BE955E7291E774A951CB6A
                                  APIs
                                  • ExitThread.KERNEL32 ref: 004017F4
                                    • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                    • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401902
                                    • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                  • __Init_thread_footer.LIBCMT ref: 004017BC
                                    • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                    • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                  • String ID: XMG$NG$NG
                                  • API String ID: 1596592924-1283814050
                                  • Opcode ID: 1d427ad3c8646c7af8f92f397ae04b57ed9a744fd571dcf8e9b2171af239d2c3
                                  • Instruction ID: a5e0bc9ac4bbc073a85812dd1d3adb1d2a3c84d0b98f0a89840e4e641ba94373
                                  • Opcode Fuzzy Hash: 1d427ad3c8646c7af8f92f397ae04b57ed9a744fd571dcf8e9b2171af239d2c3
                                  • Instruction Fuzzy Hash: 5341B4712042008BC329FB65DD96AAE7395EB94318F10453FF54AA31F2DF389986CB5E
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412D99
                                    • Part of subcall function 00412A82: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412AF5
                                    • Part of subcall function 00412A82: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412B24
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  • RegCloseKey.ADVAPI32(TeFTeF,00466554,00466554,00466900,00466900,00000071), ref: 00412F09
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnumInfoOpenQuerysend
                                  • String ID: TeFTeF$NG$TG$TG
                                  • API String ID: 3114080316-826076573
                                  • Opcode ID: 6c1db13cde9a772bdcef3daeeb83b5efafd3d4bad46828ca18ea53aaf252cc2e
                                  • Instruction ID: 217e792c851e8857c64f97df11b7492b8bc11e7bd79a931969a0b124146415da
                                  • Opcode Fuzzy Hash: 6c1db13cde9a772bdcef3daeeb83b5efafd3d4bad46828ca18ea53aaf252cc2e
                                  • Instruction Fuzzy Hash: ED41A1316042005BD224F725D8A2AEF7395AFD0308F50843FF94A671E2EF7C5D4986AE
                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 00437CBB
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00437CC3
                                  • _ValidateLocalCookies.LIBCMT ref: 00437D51
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00437D7C
                                  • _ValidateLocalCookies.LIBCMT ref: 00437DD1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: e20e4e91601e7da6f84b85b393d4409c90c36ea595a33a74ae9b4edf16c34eae
                                  • Instruction ID: 1103995f59bc857a00dd0af833384e4a9f5f4a2e3f3cb1d3a3c35a3a433dd29e
                                  • Opcode Fuzzy Hash: e20e4e91601e7da6f84b85b393d4409c90c36ea595a33a74ae9b4edf16c34eae
                                  • Instruction Fuzzy Hash: 4E410674A042099BCF20DF29C844AAE7BA5AF4C328F14905AEC55AB392D739DD45CF98
                                  APIs
                                    • Part of subcall function 004125EB: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 0041260F
                                    • Part of subcall function 004125EB: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 0041262C
                                    • Part of subcall function 004125EB: RegCloseKey.KERNEL32(?), ref: 00412637
                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                  • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                  • API String ID: 1133728706-4073444585
                                  • Opcode ID: 798b700cde0c1926405b4a04a5924c1096cb72e5c493937ed5f3ed64600f93a0
                                  • Instruction ID: 7ed93d3ebd4d115a7197ccd8f2df160251767479400bef64a6787df62d4369c8
                                  • Opcode Fuzzy Hash: 798b700cde0c1926405b4a04a5924c1096cb72e5c493937ed5f3ed64600f93a0
                                  • Instruction Fuzzy Hash: 29215C31A1410966CB04F7B2CCA69EE7764AE94318F40013FA902771D2EF789A4986DE
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cfbae8f3dcd2e5f3bdf3bcee8d3106cebccc1d81cd58107c476234e6777acd1f
                                  • Instruction ID: 890753aa9dfb888b2a1585f98a5e225511b13b718af609ae416a1884f745cca0
                                  • Opcode Fuzzy Hash: cfbae8f3dcd2e5f3bdf3bcee8d3106cebccc1d81cd58107c476234e6777acd1f
                                  • Instruction Fuzzy Hash: 3A112472504A15BFDB206F729C08D3B3AACEB82736F20016EFC15D7282DE38C800C669
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FCD4
                                  • int.LIBCPMT ref: 0040FCE7
                                    • Part of subcall function 0040CFB3: std::_Lockit::_Lockit.LIBCPMT ref: 0040CFC4
                                    • Part of subcall function 0040CFB3: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CFDE
                                  • std::_Facet_Register.LIBCPMT ref: 0040FD23
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0040FD49
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040FD65
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                  • String ID: xkG
                                  • API String ID: 2536120697-3406988965
                                  • Opcode ID: 4b6f72b1e0d08092fd2688f9826419a51511b3482868562e895aff95ac9ad519
                                  • Instruction ID: 7cf641d0f45d7e480cf6c67891cb53e845b1d2cd586d61112ae60f6436568b55
                                  • Opcode Fuzzy Hash: 4b6f72b1e0d08092fd2688f9826419a51511b3482868562e895aff95ac9ad519
                                  • Instruction Fuzzy Hash: 3B11F032900119A7CB14FBA5D8429DEB7689E55358F10013BF809B72D1EB3CAF49C7D9
                                  APIs
                                    • Part of subcall function 0044FC32: _free.LIBCMT ref: 0044FC5B
                                  • _free.LIBCMT ref: 0044FF39
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  • _free.LIBCMT ref: 0044FF44
                                  • _free.LIBCMT ref: 0044FF4F
                                  • _free.LIBCMT ref: 0044FFA3
                                  • _free.LIBCMT ref: 0044FFAE
                                  • _free.LIBCMT ref: 0044FFB9
                                  • _free.LIBCMT ref: 0044FFC4
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                  • Instruction ID: 7d3bb130547cbd64d3bc6acdbb054c191a8682768e3bc5df2cfa43195c7f437f
                                  • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                  • Instruction Fuzzy Hash: 3611603158175CAAE930B7B2CC87FCB779CFF01744F804C2EB69B66052DA2CB90A5655
                                  APIs
                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe), ref: 00406835
                                    • Part of subcall function 00406764: _wcslen.LIBCMT ref: 00406788
                                    • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004669B0,00000000), ref: 004067E9
                                  • CoUninitialize.OLE32 ref: 0040688E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InitializeObjectUninitialize_wcslen
                                  • String ID: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                  • API String ID: 3851391207-895824092
                                  • Opcode ID: f62f8ea22737c4132ff5b3dac93a03cf3a5d885852b0606909ed978fbfad8032
                                  • Instruction ID: bf5204b976fdd256b066cceb308157ad377b3c08e3874fea13dbf5f4dff6080c
                                  • Opcode Fuzzy Hash: f62f8ea22737c4132ff5b3dac93a03cf3a5d885852b0606909ed978fbfad8032
                                  • Instruction Fuzzy Hash: F20180722023117FE2287B21DC0EF7B6658DB4176AF12413FF946A71C1EAA9AC014679
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040FFB7
                                  • int.LIBCPMT ref: 0040FFCA
                                    • Part of subcall function 0040CFB3: std::_Lockit::_Lockit.LIBCPMT ref: 0040CFC4
                                    • Part of subcall function 0040CFB3: std::_Lockit::~_Lockit.LIBCPMT ref: 0040CFDE
                                  • std::_Facet_Register.LIBCPMT ref: 00410006
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0041002C
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410048
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                  • String ID: pmG
                                  • API String ID: 2536120697-2472243355
                                  • Opcode ID: 49ddf8ddb094ef95c775291761389dec69e80ba720e56a3ba1433f00512a79dc
                                  • Instruction ID: 7757f8b08a06b45aa46d7f93aac2e311949306114fe400d1b3bff67def6a62fd
                                  • Opcode Fuzzy Hash: 49ddf8ddb094ef95c775291761389dec69e80ba720e56a3ba1433f00512a79dc
                                  • Instruction Fuzzy Hash: D911B231900419EBCB14FBA5D9429DD7B689E58358F10016FF40567191EB78AF86C789
                                  APIs
                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040B2E4
                                  • GetLastError.KERNEL32 ref: 0040B2EE
                                  Strings
                                  • UserProfile, xrefs: 0040B2B4
                                  • [Chrome Cookies found, cleared!], xrefs: 0040B314
                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040B2AF
                                  • [Chrome Cookies not found], xrefs: 0040B308
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteErrorFileLast
                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                  • API String ID: 2018770650-304995407
                                  • Opcode ID: d40c76f0172b5f629c93352544436a109877037e88603abf99357d2e74e673d4
                                  • Instruction ID: 9d7a183bab8cffc7e176200adf3036985cfece21d6991fc3b8afe8d0fe8b9813
                                  • Opcode Fuzzy Hash: d40c76f0172b5f629c93352544436a109877037e88603abf99357d2e74e673d4
                                  • Instruction Fuzzy Hash: AB01623565010557CB0477B6DD6B9AF3628ED51718B60013FF802771E2FE3A990586DE
                                  APIs
                                  • AllocConsole.KERNEL32(004750FC), ref: 0041C0C4
                                  • ShowWindow.USER32(00000000,00000000), ref: 0041C0DD
                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041C102
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Console$AllocOutputShowWindow
                                  • String ID: Remcos v$6.0.0 Pro$CONOUT$
                                  • API String ID: 2425139147-3561919337
                                  • Opcode ID: 51f71f4df576cdb042b408fdcee2c306aad9b55f4cf694b49fe88f2f6d88a06c
                                  • Instruction ID: 9cd6404a4583bb7861016a5e8077681a34a6ce6b29b6da971a73374578d830bb
                                  • Opcode Fuzzy Hash: 51f71f4df576cdb042b408fdcee2c306aad9b55f4cf694b49fe88f2f6d88a06c
                                  • Instruction Fuzzy Hash: 750121B1A80304BADA10F7F19D4BF9976AC6B14B09F500426BA05A70C2EEB8A554462D
                                  APIs
                                  • __allrem.LIBCMT ref: 00439999
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004399B5
                                  • __allrem.LIBCMT ref: 004399CC
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004399EA
                                  • __allrem.LIBCMT ref: 00439A01
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00439A1F
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                  • String ID:
                                  • API String ID: 1992179935-0
                                  • Opcode ID: b56df2ec526ecb605ad204b00dc5db07d06cb4bbbde3923a820af03cd63327b9
                                  • Instruction ID: 5399b0f9a6461ae69e9bde9777a653eaf6085cdcce353b40ae7049a42401d5b7
                                  • Opcode Fuzzy Hash: b56df2ec526ecb605ad204b00dc5db07d06cb4bbbde3923a820af03cd63327b9
                                  • Instruction Fuzzy Hash: 15810B72A00706ABE724BA79CC41B6B73E89F89768F24522FF411D7781E7B8DD008758
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __cftoe
                                  • String ID:
                                  • API String ID: 4189289331-0
                                  • Opcode ID: 59a84199312040bebd3b7080c8be9dd535ae7880d2ee6b6a8de25d9cd02a2692
                                  • Instruction ID: 890c16c57639ce4616fdae23c1b2cf08611ffd87950db76db0bf4773250d0152
                                  • Opcode Fuzzy Hash: 59a84199312040bebd3b7080c8be9dd535ae7880d2ee6b6a8de25d9cd02a2692
                                  • Instruction Fuzzy Hash: 2C512972900205ABFB249BA98C41FAF77A9EFC8324F24411FF815D6292DB3DDD11966C
                                  APIs
                                  • Sleep.KERNEL32(00000000), ref: 00403E8A
                                    • Part of subcall function 00403FCD: __EH_prolog.LIBCMT ref: 00403FD2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: H_prologSleep
                                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                  • API String ID: 3469354165-3054508432
                                  • Opcode ID: 010587e62b3dbee68a1d40af84174acf88dcfbf5514f605d81dee2fe658d14e6
                                  • Instruction ID: 0fabaa65846f565374d927adde4572b2cc1454b627dc53539f04e4ca1ee376cc
                                  • Opcode Fuzzy Hash: 010587e62b3dbee68a1d40af84174acf88dcfbf5514f605d81dee2fe658d14e6
                                  • Instruction Fuzzy Hash: 4641B031A0420196C614FF75C956AAD3BA59B81708F00453FF809A72E6DF7C9A85C7CF
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 00419FF2
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A006
                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A013
                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,004196FD), ref: 0041A048
                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A05A
                                  • CloseServiceHandle.ADVAPI32(00000000,?,00000000,?,?,004196FD,00000000,00000000), ref: 0041A05D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                  • String ID:
                                  • API String ID: 493672254-0
                                  • Opcode ID: b1d06779e49364f5efd1e1156e42b495588f4c67c2645d9207e201a63b841c04
                                  • Instruction ID: 3721d8981427c9c50277447f2eb78ca90bee9705940f35750f03ddb94c099399
                                  • Opcode Fuzzy Hash: b1d06779e49364f5efd1e1156e42b495588f4c67c2645d9207e201a63b841c04
                                  • Instruction Fuzzy Hash: 28016D315062107ED2111F349C0EEBF3E1CDF567B1F00022FF522A22D2DE69CE8981AA
                                  APIs
                                  • GetLastError.KERNEL32(?,?,0043800D,004379C1), ref: 00438024
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00438032
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043804B
                                  • SetLastError.KERNEL32(00000000,?,0043800D,004379C1), ref: 0043809D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 3d2ceef5274e4dce0ae2caf7dfaf84fccaef2f9a96c7b33c4be4e75810a8a5f0
                                  • Instruction ID: c897193d57ecee64636fe05851fbd3cadc70b6e754ca2b2668497838eaebe06c
                                  • Opcode Fuzzy Hash: 3d2ceef5274e4dce0ae2caf7dfaf84fccaef2f9a96c7b33c4be4e75810a8a5f0
                                  • Instruction Fuzzy Hash: DC0190321083416DFB2823756C465377B68E709378F21123FF328515F1EF994C44514C
                                  APIs
                                  • GetLastError.KERNEL32(?,?,0043952C,?,00000000,?,0043BB65,00000000,00000000), ref: 004470D3
                                  • _free.LIBCMT ref: 00447106
                                  • _free.LIBCMT ref: 0044712E
                                  • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 0044713B
                                  • SetLastError.KERNEL32(00000000,00000000,00000000), ref: 00447147
                                  • _abort.LIBCMT ref: 0044714D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$_free$_abort
                                  • String ID:
                                  • API String ID: 3160817290-0
                                  • Opcode ID: ae40a63e46beb22daa4956e078090859b5f7183b7e2bf3c5c9b8e84b2b7f2479
                                  • Instruction ID: 03a1e9305cc52ab1e573739f72da4c843e3c1f7cd4612cbd08a2c6f68691a865
                                  • Opcode Fuzzy Hash: ae40a63e46beb22daa4956e078090859b5f7183b7e2bf3c5c9b8e84b2b7f2479
                                  • Instruction Fuzzy Hash: F2F0F931508B1027F612777A6C46E1B15269BC17B6B26002FF509A6392EF2C8C07911D
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E25
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E39
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E46
                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E55
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E67
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,00419991,00000000,00000000), ref: 00419E6A
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: f39116070f43c8ef762b87d05958f062f452bea97bf42776bddf3ff77cc24258
                                  • Instruction ID: 47980c42e9b022aba05d73d81e1ae7aa31c0ed05cef52b60765f03c540efa169
                                  • Opcode Fuzzy Hash: f39116070f43c8ef762b87d05958f062f452bea97bf42776bddf3ff77cc24258
                                  • Instruction Fuzzy Hash: 44F062319003186BD611AB65DC89EBF3B6CDB45BA1F01002AF906A21D2DF78DD4A95F5
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419F8C
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FA0
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FAD
                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FBC
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FCE
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041988D,00000000,00000000), ref: 00419FD1
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: 7777fcf707120254506fa4e92061de2525c9cf476e2c623219f1f225c16140d8
                                  • Instruction ID: cbb6f8d25e78bf3f904679f952f169c6c08018e661e4ba535c0ca8fa304c3d8e
                                  • Opcode Fuzzy Hash: 7777fcf707120254506fa4e92061de2525c9cf476e2c623219f1f225c16140d8
                                  • Instruction Fuzzy Hash: 68F0C2315002147BD2116B24DC49EBF3A6CDB45BA1B01002AFA06A2192DF78CE4A85B8
                                  APIs
                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F27
                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F3B
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F48
                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F57
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F69
                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041990F,00000000,00000000), ref: 00419F6C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Service$CloseHandle$Open$ControlManager
                                  • String ID:
                                  • API String ID: 221034970-0
                                  • Opcode ID: c477b1fb9180f2e7e4f1d3c6d81281581987cb622c6cefb8769b920387ec4a4b
                                  • Instruction ID: 95d7f5aa039a93820bb4883d7663946178ed8a5ec9cf590f88e81ba893971d89
                                  • Opcode Fuzzy Hash: c477b1fb9180f2e7e4f1d3c6d81281581987cb622c6cefb8769b920387ec4a4b
                                  • Instruction Fuzzy Hash: 7EF062715003147BD2116B65DC4AEBF3B6CDB45BA1B01002AFA06B2192DF78DD4A96B9
                                  APIs
                                  • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412AF5
                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412B24
                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412BC5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Enum$InfoQueryValue
                                  • String ID: [regsplt]$TG
                                  • API String ID: 3554306468-170812940
                                  • Opcode ID: 552d9661e2012087ec903fbf914702d6585a55026011734f2d78172ad3ed553d
                                  • Instruction ID: eeb20da9b05a32976bf12a6402f5e40020a9f6991e42d7db5c0f7bae6a1218cc
                                  • Opcode Fuzzy Hash: 552d9661e2012087ec903fbf914702d6585a55026011734f2d78172ad3ed553d
                                  • Instruction Fuzzy Hash: C5511E72108345AED310EF61D985DEFB7ECEF84704F00492EB585D2191EB74EA088BAA
                                  APIs
                                    • Part of subcall function 0041265C: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?), ref: 0041267E
                                    • Part of subcall function 0041265C: RegQueryValueExW.ADVAPI32(?,0040E18D,00000000,00000000,?,00000400), ref: 0041269D
                                    • Part of subcall function 0041265C: RegCloseKey.ADVAPI32(?), ref: 004126A6
                                    • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                  • _wcslen.LIBCMT ref: 0041AB01
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                  • String ID: .exe$http\shell\open\command$program files (x86)\$program files\
                                  • API String ID: 37874593-4246244872
                                  • Opcode ID: f96227f50e5d78c7b5b45e1ee0af5fe3d836a00b2a4c6991fda99104d0e8455f
                                  • Instruction ID: 944f249e3467cd2310196e71108a033bc811508d99a3a404dc4e3305fa2889c9
                                  • Opcode Fuzzy Hash: f96227f50e5d78c7b5b45e1ee0af5fe3d836a00b2a4c6991fda99104d0e8455f
                                  • Instruction Fuzzy Hash: 8621A772B001042BDB04B6B58C96EFE366D9B84318B10087FF452B71D3EE3C9D554269
                                  APIs
                                    • Part of subcall function 00433724: EnterCriticalSection.KERNEL32(00471D18,?,00476D54,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043372F
                                    • Part of subcall function 00433724: LeaveCriticalSection.KERNEL32(00471D18,?,0040AE8B,00476D54,?,00000000,00000000), ref: 0043376C
                                    • Part of subcall function 00433AB0: __onexit.LIBCMT ref: 00433AB6
                                  • __Init_thread_footer.LIBCMT ref: 0040AEA7
                                    • Part of subcall function 004336DA: EnterCriticalSection.KERNEL32(00471D18,00476D54,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 004336E4
                                    • Part of subcall function 004336DA: LeaveCriticalSection.KERNEL32(00471D18,?,0040AEAC,00476D54,00456FA7,?,00000000,00000000), ref: 00433717
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit
                                  • String ID: [End of clipboard]$[Text copied to clipboard]$TmG$XmG
                                  • API String ID: 2974294136-1855599884
                                  • Opcode ID: a655278a6fff3861fa5d9868fc884946ffe2fcef33f4f6cd05f1e75e6ddf1962
                                  • Instruction ID: 2623299308dd9d50029d580546b1e3590cd03a5acc49d0be8ee118f943746456
                                  • Opcode Fuzzy Hash: a655278a6fff3861fa5d9868fc884946ffe2fcef33f4f6cd05f1e75e6ddf1962
                                  • Instruction Fuzzy Hash: FB216131A102155ACB24FB65D8929EE7775AF54318F10403FF506772E2EF3C6E4A868D
                                  APIs
                                  • RegisterClassExA.USER32(00000030), ref: 0041CC77
                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CC92
                                  • GetLastError.KERNEL32 ref: 0041CC9C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ClassCreateErrorLastRegisterWindow
                                  • String ID: 0$MsgWindowClass
                                  • API String ID: 2877667751-2410386613
                                  • Opcode ID: 2bfcb1dee2ed81dd37ad325623522de50802513b554cdfc95296743f6fff5b81
                                  • Instruction ID: c9edb97a89f7ec8dfbaa779d36c224b53f51aa00da94833f787b12e8c600820c
                                  • Opcode Fuzzy Hash: 2bfcb1dee2ed81dd37ad325623522de50802513b554cdfc95296743f6fff5b81
                                  • Instruction Fuzzy Hash: 2001E9B1D1021DAF8B00DF9ADCC49EFFBBDBE49355B50452AE414B6100EB708A458AA5
                                  APIs
                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 00406A00
                                  • CloseHandle.KERNEL32(?), ref: 00406A0F
                                  • CloseHandle.KERNEL32(?), ref: 00406A14
                                  Strings
                                  • C:\Windows\System32\cmd.exe, xrefs: 004069FB
                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004069F6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$CreateProcess
                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                  • API String ID: 2922976086-4183131282
                                  • Opcode ID: 76fab65495b0fd8f7af94722782b38f5ec20939b495d63d65361185c7f15ad50
                                  • Instruction ID: 0865c4136dfbb59e32125d892e445ee09242962a1e3dc4bc305b740a121ed375
                                  • Opcode Fuzzy Hash: 76fab65495b0fd8f7af94722782b38f5ec20939b495d63d65361185c7f15ad50
                                  • Instruction Fuzzy Hash: 68F090B690029D7ACB20ABD69C0EECF7F3CEBC5B11F01046ABA04A2051DA706104CAB8
                                  Strings
                                  • 8SG, xrefs: 0040693F
                                  • C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe, xrefs: 00406927
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 8SG$C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                  • API String ID: 0-257871050
                                  • Opcode ID: 440f994380ae97e7c47f4173536c55f38e93d9cb79c908ea235c8484f88855d2
                                  • Instruction ID: ac3f053366391772af188fc274efb03f25e4c049f181d6a95d7665767018bac5
                                  • Opcode Fuzzy Hash: 440f994380ae97e7c47f4173536c55f38e93d9cb79c908ea235c8484f88855d2
                                  • Instruction Fuzzy Hash: 4FF0F6B17022109BDB103B34AD1966A3A45DB40346F01807BF98BFA6E2DF7C8851C68C
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044279A,?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002), ref: 00442809
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044281C
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044279A,?,?,0044273A,?,0046EAF0,0000000C,00442891,?,00000002,00000000), ref: 0044283F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 263cd25904221f4c100099ecbb428eb8354416072efb1e7fc04c1483da550fa7
                                  • Instruction ID: e557d05a47d06e8d32a7f66c2c4e22cdfb14d47a79db446b90f8ad9ee3cbc836
                                  • Opcode Fuzzy Hash: 263cd25904221f4c100099ecbb428eb8354416072efb1e7fc04c1483da550fa7
                                  • Instruction Fuzzy Hash: 8CF0A430900309FBDB119F94DD09B9EBFB4EB08753F4041B9F805A2261DF789D44CA98
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,0040483F,00000001,?,00000000,?,0040466D,00000000,?), ref: 00404AED
                                  • SetEvent.KERNEL32(?,?,00000000,?,0040466D,00000000,?), ref: 00404AF9
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,?,0040466D,00000000,?), ref: 00404B04
                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,0040466D,00000000,?), ref: 00404B0D
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                  • String ID: KeepAlive | Disabled
                                  • API String ID: 2993684571-305739064
                                  • Opcode ID: 3ad55c3dc5f6f3fe6add9deac0dab9812a85fcbbdc7a8e47626d343f98173556
                                  • Instruction ID: 7c4d48bbaa8a7164c3353f7df4ad5523490a6ea0f3ebe4e46dcacb08dafaa92a
                                  • Opcode Fuzzy Hash: 3ad55c3dc5f6f3fe6add9deac0dab9812a85fcbbdc7a8e47626d343f98173556
                                  • Instruction Fuzzy Hash: 31F096B19047007BDB1137759D0B66B7F58AB46325F00096FF492A26F2DE39D8508B5E
                                  APIs
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041A15A
                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041A168
                                  • Sleep.KERNEL32(00002710), ref: 0041A16F
                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041A178
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                  • String ID: Alarm triggered
                                  • API String ID: 614609389-2816303416
                                  • Opcode ID: 859fac31fcb8157fef4fccd01110b6d68f3f64b9bd70d3344d64368d38890a6d
                                  • Instruction ID: 198adcd2ac8b5b4b9acde76a755fda1533c143b191b85f9fe5233f4cbfc21951
                                  • Opcode Fuzzy Hash: 859fac31fcb8157fef4fccd01110b6d68f3f64b9bd70d3344d64368d38890a6d
                                  • Instruction Fuzzy Hash: 79E01A22A04261379520337B7D0FD6F3D28EAC7B65741006FF905A6192EE580811C6FB
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041C10D), ref: 0041C084
                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041C10D), ref: 0041C091
                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041C10D), ref: 0041C09E
                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041C10D), ref: 0041C0B1
                                  Strings
                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041C0A4
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                  • API String ID: 3024135584-2418719853
                                  • Opcode ID: 1559ced9db44309d12e9096fc874ef99716f3117c459c374921cc59209bdbdc6
                                  • Instruction ID: f27d36e20d2a67c690befc106ea5cafab99e09d075a2dfca7d32a9b7008c9529
                                  • Opcode Fuzzy Hash: 1559ced9db44309d12e9096fc874ef99716f3117c459c374921cc59209bdbdc6
                                  • Instruction Fuzzy Hash: 57E04F62604348BBD30037F6AC4EDAB3B7CE784617B10092AF612A01D3ED7484468B79
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a796732182faefe73add1043189caf6ca4f606f7631d49291716b08cb320153
                                  • Instruction ID: 7c1105064789ab48ae90d42f937b6a9cbc34ac1ed42c20d541c6d1c3f1a57216
                                  • Opcode Fuzzy Hash: 2a796732182faefe73add1043189caf6ca4f606f7631d49291716b08cb320153
                                  • Instruction Fuzzy Hash: 7671D371900216AFEF20CF54C884ABFBB75EF45310F14422BEA15A7281DB788C61CFA9
                                  APIs
                                    • Part of subcall function 00410691: SetLastError.KERNEL32(0000000D,00410C10,?,00000000), ref: 00410697
                                  • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410BED), ref: 00410C9C
                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410D02
                                  • HeapAlloc.KERNEL32(00000000,?,?,00000000), ref: 00410D09
                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00410E17
                                  • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410BED), ref: 00410E41
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$Heap$AllocInfoNativeProcessSystem
                                  • String ID:
                                  • API String ID: 3525466593-0
                                  • Opcode ID: 5b761030cf84cfef50a77e8f1fc708b710696a941d42968a3fbf92de24ca1f36
                                  • Instruction ID: e2f64966b18619331c3eea81ef564f6afd9e4387f8ea08f62d3b86939114ae32
                                  • Opcode Fuzzy Hash: 5b761030cf84cfef50a77e8f1fc708b710696a941d42968a3fbf92de24ca1f36
                                  • Instruction Fuzzy Hash: 8E61E570200305ABD710AF56C981BA77BA5BF84308F04451EF909CB382DBF8E8D5CB99
                                  APIs
                                    • Part of subcall function 0041B366: GetCurrentProcess.KERNEL32(?,?,?,0040C914,WinDir,00000000,00000000), ref: 0041B377
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E799
                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040E7BD
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E7CC
                                  • CloseHandle.KERNEL32(00000000), ref: 0040E983
                                    • Part of subcall function 0041B392: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E5A8,00000000,?,?,004750FC), ref: 0041B3A7
                                    • Part of subcall function 0041B588: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                    • Part of subcall function 0041B588: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E974
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 4269425633-0
                                  • Opcode ID: 3366b4ead4964822d51a377a6cc07ead533fc4a33b6b1b1c4321a9046ca66678
                                  • Instruction ID: eccf11dc20c1a31a83cdfd33956dcb3d749eb3f266b118f2c15681f5292a9231
                                  • Opcode Fuzzy Hash: 3366b4ead4964822d51a377a6cc07ead533fc4a33b6b1b1c4321a9046ca66678
                                  • Instruction Fuzzy Hash: F741CF311083455BC225FB61D891AEFB7E5AFA4304F50453EF849531E1EF389A49C65A
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: c6d5326bb826bef7d4312f682f8fd03de73532d4ef60da68ba97a8c78ea7af64
                                  • Instruction ID: 036c3dfb054a6f01566e3cd8d28730a68c174e79056a6e67996f15c63748089b
                                  • Opcode Fuzzy Hash: c6d5326bb826bef7d4312f682f8fd03de73532d4ef60da68ba97a8c78ea7af64
                                  • Instruction Fuzzy Hash: F341D636A002049FEB20DF79C881A5EB7B5FF88718F1545AEE915EB351DA35EE01CB84
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,0043E5FD,?,00000000,?,00000001,?,?,00000001,0043E5FD,?), ref: 00450130
                                  • __alloca_probe_16.LIBCMT ref: 00450168
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004501B9
                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00439BCF,?), ref: 004501CB
                                  • __freea.LIBCMT ref: 004501D4
                                    • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                  • String ID:
                                  • API String ID: 313313983-0
                                  • Opcode ID: daed02162d7f278869bfaea3c7a8f88d5c2a2d3218cc1490f903801f97ac0c2c
                                  • Instruction ID: d7464a72994917abc30d80f71ec8451e4cba9cf5435b4dea42e63c5c2bdc5daf
                                  • Opcode Fuzzy Hash: daed02162d7f278869bfaea3c7a8f88d5c2a2d3218cc1490f903801f97ac0c2c
                                  • Instruction Fuzzy Hash: 9631E132A0060AABDF249F65DC41DAF7BA5EB00311F05416AFC04E7252EB3ACD54CBA5
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044E354
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E377
                                    • Part of subcall function 00446D0F: RtlAllocateHeap.NTDLL(00000000,00434613,?,?,00437437,?,?,?,?,?,0040CD5A,00434613,?,?,?,?), ref: 00446D41
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E39D
                                  • _free.LIBCMT ref: 0044E3B0
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E3BF
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                  • String ID:
                                  • API String ID: 336800556-0
                                  • Opcode ID: 1d4758ed0160ac471983c8ffd3a0470c3cf8fd4ea00c3cafbe93e28275fbbba9
                                  • Instruction ID: 5f1b7bba735f2dc00ee4e6ee14e94985e19ed078b50b1d1b699098eccd63c47a
                                  • Opcode Fuzzy Hash: 1d4758ed0160ac471983c8ffd3a0470c3cf8fd4ea00c3cafbe93e28275fbbba9
                                  • Instruction Fuzzy Hash: D50171726017157F73221A776C88C7B6A6DEAC2F65315012EFD05D3241DE698C0291B9
                                  APIs
                                  • _free.LIBCMT ref: 0044F9C5
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  • _free.LIBCMT ref: 0044F9D7
                                  • _free.LIBCMT ref: 0044F9E9
                                  • _free.LIBCMT ref: 0044F9FB
                                  • _free.LIBCMT ref: 0044FA0D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 8a0a0e5e94a0327d1776c165067cf9b9603f8d21362122b3839296c578ae3d6e
                                  • Instruction ID: 2de1f51a18cc7960585f1cc37bbb46b0208bdbaa703fd0d38dd13c161260ee8b
                                  • Opcode Fuzzy Hash: 8a0a0e5e94a0327d1776c165067cf9b9603f8d21362122b3839296c578ae3d6e
                                  • Instruction Fuzzy Hash: B5F012725042107BA620DF59FAC6D1773E9EA457247A5482BF18DEBA51C738FCC0865C
                                  APIs
                                  • _free.LIBCMT ref: 00443515
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  • _free.LIBCMT ref: 00443527
                                  • _free.LIBCMT ref: 0044353A
                                  • _free.LIBCMT ref: 0044354B
                                  • _free.LIBCMT ref: 0044355C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 5455ce8706e3ca66a7bad791c73c4693f29d9b457f563819123ce72749b06e66
                                  • Instruction ID: bf08c2b723e6da78e2f9a692d3f9dcffc94df7bb1312aea5ebb3a1bf48e2a6b8
                                  • Opcode Fuzzy Hash: 5455ce8706e3ca66a7bad791c73c4693f29d9b457f563819123ce72749b06e66
                                  • Instruction Fuzzy Hash: 4EF0FEB08011219FD726AF69BE414063BA0F709764346113BF45E66B71E7790982EB8E
                                  APIs
                                  • GetWindowThreadProcessId.USER32(?,?), ref: 0041694E
                                  • GetWindowTextW.USER32(?,?,0000012C), ref: 00416980
                                  • IsWindowVisible.USER32(?), ref: 00416987
                                    • Part of subcall function 0041B588: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                    • Part of subcall function 0041B588: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ProcessWindow$Open$TextThreadVisible
                                  • String ID: 0VG
                                  • API String ID: 3142014140-3748860515
                                  • Opcode ID: 5f5be7a680c77d9aba54e705b4bd1eceedbb58bf7c1a937234ed4b99e2641d2f
                                  • Instruction ID: a92d2c2722018a5f2df8734f3a85bf91d45912e01cb50305def5a483f7f9536a
                                  • Opcode Fuzzy Hash: 5f5be7a680c77d9aba54e705b4bd1eceedbb58bf7c1a937234ed4b99e2641d2f
                                  • Instruction Fuzzy Hash: FE71C3311082415AC335FB61D8A5ADFB3E4EFD4308F50493EB58A530E1EF74AA49CB9A
                                  APIs
                                  • _strpbrk.LIBCMT ref: 0044D6B8
                                  • _free.LIBCMT ref: 0044D7D5
                                    • Part of subcall function 0043AA64: IsProcessorFeaturePresent.KERNEL32(00000017,0043AA36,00000000,0000000A,0000000A,00000000,0041AF72,00000022,?,?,0043AA43,00000000,00000000,00000000,00000000,00000000), ref: 0043AA66
                                    • Part of subcall function 0043AA64: GetCurrentProcess.KERNEL32(C0000417,0000000A,00000000), ref: 0043AA88
                                    • Part of subcall function 0043AA64: TerminateProcess.KERNEL32(00000000), ref: 0043AA8F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                  • String ID: *?$.
                                  • API String ID: 2812119850-3972193922
                                  • Opcode ID: a944b580e8880c8e130e00bdfc146e92b9e44dab990486ab21efc68c0a65a633
                                  • Instruction ID: 04f9c45711fae47bd805a28d6c684d852fff3551aaaea8338e0504d4b1d9eb7e
                                  • Opcode Fuzzy Hash: a944b580e8880c8e130e00bdfc146e92b9e44dab990486ab21efc68c0a65a633
                                  • Instruction Fuzzy Hash: C251B175E00209AFEF14DFA9C881AAEBBB5EF58314F25416FE854E7301E6399E01CB54
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe,00000104), ref: 00442924
                                  • _free.LIBCMT ref: 004429EF
                                  • _free.LIBCMT ref: 004429F9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$FileModuleName
                                  • String ID: C:\Users\user\Desktop\P87unxnF4t4DSrTt43.exe
                                  • API String ID: 2506810119-198340475
                                  • Opcode ID: e43589620df6d0a02bbe9fe69612e96b807286bf84d647a6e2c91bfdc5f7fdb4
                                  • Instruction ID: 08a660f2d8e46f51ee0862092f41265a48d7a3eaa7bec75f040af8368b354bfd
                                  • Opcode Fuzzy Hash: e43589620df6d0a02bbe9fe69612e96b807286bf84d647a6e2c91bfdc5f7fdb4
                                  • Instruction Fuzzy Hash: E53193B1A00258AFEB21DF999E8199EBBBCEB85314F50406BF805A7311D6F84A41CB59
                                  APIs
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                    • Part of subcall function 0041AD43: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466900,0040C07B,.vbs,?,?,?,?,?,00475308), ref: 0041AD6A
                                    • Part of subcall function 0041789C: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00466324), ref: 004178B2
                                    • Part of subcall function 0041789C: CloseHandle.KERNEL32($cF,?,?,00403AB9,00466324), ref: 004178BB
                                    • Part of subcall function 0041B825: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                  • Sleep.KERNEL32(000000FA,00466324), ref: 00403AFC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                  • String ID: /sort "Visit Time" /stext "$0NG
                                  • API String ID: 368326130-3219657780
                                  • Opcode ID: 5e8ae3cd725a241a357b3bc659f6e93b21b3cbb6c2d909dfabbc6bc7442c3c9c
                                  • Instruction ID: 03df4c4d2d4284c33795d9a7a6d048d6c9d09091ba23d5cef523323604a75e49
                                  • Opcode Fuzzy Hash: 5e8ae3cd725a241a357b3bc659f6e93b21b3cbb6c2d909dfabbc6bc7442c3c9c
                                  • Instruction Fuzzy Hash: 88319531A0011456CB14FB76DC969EE7779AF80318F00007FF906B31D2EF385A4AC699
                                  APIs
                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                  • wsprintfW.USER32 ref: 0040A905
                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EventLocalTimewsprintf
                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                  • API String ID: 1497725170-1359877963
                                  • Opcode ID: ea11600db4f77dcee9ebc1c4f234068d00857ef660b0d65a2ac97eac66832df2
                                  • Instruction ID: eacaba0d290b76b22f399a57737f65b18f8a023abca8575ba11697f47f6457b1
                                  • Opcode Fuzzy Hash: ea11600db4f77dcee9ebc1c4f234068d00857ef660b0d65a2ac97eac66832df2
                                  • Instruction Fuzzy Hash: F1115172500118AACB18FB96EC56CFF77B8AE48715B00013FF542621D1EF7C5A86C6E9
                                  APIs
                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00009993,?,00000000,00000000), ref: 0040A691
                                  • CreateThread.KERNEL32(00000000,00000000,Function_000099B5,?,00000000,00000000), ref: 0040A69D
                                  • CreateThread.KERNEL32(00000000,00000000,004099C1,?,00000000,00000000), ref: 0040A6A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread$LocalTime$wsprintf
                                  • String ID: Online Keylogger Started
                                  • API String ID: 112202259-1258561607
                                  • Opcode ID: b46e5d37908519541b081ac4b2a6a4ba4f2a1b6db6acf437ea430ac4df0ede66
                                  • Instruction ID: 13545b77b67cc4507d33d8d8c8ff512a749ba16b8a43449315e0da64450a8124
                                  • Opcode Fuzzy Hash: b46e5d37908519541b081ac4b2a6a4ba4f2a1b6db6acf437ea430ac4df0ede66
                                  • Instruction Fuzzy Hash: E80161A1A003193AE62076768C86DBF7A6DCA813A8F41043EF541662C3EA7D5D5582FA
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,00000000,8@,?,0044ABA1,8@,0046ED38,0000000C), ref: 0044ACD9
                                  • GetLastError.KERNEL32(?,0044ABA1,8@,0046ED38,0000000C), ref: 0044ACE3
                                  • __dosmaperr.LIBCMT ref: 0044AD0E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseErrorHandleLast__dosmaperr
                                  • String ID: 8@
                                  • API String ID: 2583163307-819625340
                                  • Opcode ID: f11388ad4d481d826d75519938a9a20661ac3afaecb278e3b0e3570ed3326013
                                  • Instruction ID: 727ae4bd5dc399200e14d16721253afac520870d53d00e52bc8525c117eb1139
                                  • Opcode Fuzzy Hash: f11388ad4d481d826d75519938a9a20661ac3afaecb278e3b0e3570ed3326013
                                  • Instruction Fuzzy Hash: 6F018836640A100BF3212634688573F67498B91B39F29022FF804872D2CE2D8CC1919F
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00404B26), ref: 00404B40
                                  • CloseHandle.KERNEL32(?,?,?,?,00404B26), ref: 00404B98
                                  • SetEvent.KERNEL32(?,?,?,?,00404B26), ref: 00404BA7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseEventHandleObjectSingleWait
                                  • String ID: Connection Timeout
                                  • API String ID: 2055531096-499159329
                                  • Opcode ID: e36cad49dc7765ade8417d7905e932bd8320e26522cf496d5ff7469c4126d777
                                  • Instruction ID: 3c9b6871d48b6b3111a672927d5bafc1cfd46058a166b60e959a8cf6be3f516d
                                  • Opcode Fuzzy Hash: e36cad49dc7765ade8417d7905e932bd8320e26522cf496d5ff7469c4126d777
                                  • Instruction Fuzzy Hash: 1601F5B1900B41AFD325BB3A8C4255ABFE4AB45315740053FE293A2BA2DE38E440CB5E
                                  APIs
                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004752F0), ref: 00412857
                                  • RegSetValueExW.ADVAPI32(004752F0,?,00000000,00000001,00000000,00000000,00475308,?,0040E6A3,pth_unenc,004752F0), ref: 00412885
                                  • RegCloseKey.ADVAPI32(004752F0,?,0040E6A3,pth_unenc,004752F0), ref: 00412890
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCreateValue
                                  • String ID: pth_unenc
                                  • API String ID: 1818849710-4028850238
                                  • Opcode ID: 2b72839c34b3cecad4a9efae9834add99ea03f9564e8004151796020c5cf8ad5
                                  • Instruction ID: ab464752906d06cf6e422ab9fb9c42b8cedad3247386a7cb387aa37f92243dc4
                                  • Opcode Fuzzy Hash: 2b72839c34b3cecad4a9efae9834add99ea03f9564e8004151796020c5cf8ad5
                                  • Instruction Fuzzy Hash: 2DF09071500218BBDF50AFA0EE46FEE376CEF40B55F10452AF902B60A1EF75DA08DA94
                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040CE9C
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040CEDB
                                    • Part of subcall function 004349CD: _Yarn.LIBCPMT ref: 004349EC
                                    • Part of subcall function 004349CD: _Yarn.LIBCPMT ref: 00434A10
                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040CEFF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                  • String ID: bad locale name
                                  • API String ID: 3628047217-1405518554
                                  • Opcode ID: 010949cb006bc602daa897d098c336462d98aae1940c118575e4f0b09407aa79
                                  • Instruction ID: d3fe92e39fe1a76843bdcbebe92e6b3b15f8dcb0f99b50ce5c9cc2ba4b618b17
                                  • Opcode Fuzzy Hash: 010949cb006bc602daa897d098c336462d98aae1940c118575e4f0b09407aa79
                                  • Instruction Fuzzy Hash: FEF03171004214AAC768FB62D853ADE77A4AF14758F504B3FF046224D2AF7CB619C688
                                  APIs
                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041538C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExecuteShell
                                  • String ID: /C $cmd.exe$open
                                  • API String ID: 587946157-3896048727
                                  • Opcode ID: b799db65b19b64ea83398d7d6a480beb53c0bbc67eac42254a732b9a5fcca3ea
                                  • Instruction ID: 200bce0b0309f38ec9064e519a9a4578f5a600b3ca3b701a036ea6d1077247ba
                                  • Opcode Fuzzy Hash: b799db65b19b64ea83398d7d6a480beb53c0bbc67eac42254a732b9a5fcca3ea
                                  • Instruction Fuzzy Hash: F1E0C0B11043406AC708FB65DC96DBF77AC9A90749F10483FB582621E2EE78A949865E
                                  APIs
                                  • TerminateThread.KERNEL32(004099A9,00000000,00475308,pth_unenc,0040BF26,004752F0,00475308,?,pth_unenc), ref: 0040AFC9
                                  • UnhookWindowsHookEx.USER32(00475108), ref: 0040AFD5
                                  • TerminateThread.KERNEL32(Function_00009993,00000000,?,pth_unenc), ref: 0040AFE3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: TerminateThread$HookUnhookWindows
                                  • String ID: pth_unenc
                                  • API String ID: 3123878439-4028850238
                                  • Opcode ID: 5ce168509fd4f53ac483e5472d8910f69c83d539265d002f33f874c0df2e9344
                                  • Instruction ID: 19faee7e247875c6ed4f8509c992ad96cda0262a64c11258bcf204109443e34b
                                  • Opcode Fuzzy Hash: 5ce168509fd4f53ac483e5472d8910f69c83d539265d002f33f874c0df2e9344
                                  • Instruction Fuzzy Hash: BEE01DB1245715DFD3101F545C94825BB99EB44746324087FF6C165252CD798C14C759
                                  APIs
                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 0040143A
                                  • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressHandleModuleProc
                                  • String ID: GetCursorInfo$User32.dll
                                  • API String ID: 1646373207-2714051624
                                  • Opcode ID: 0df56b3ea47fb749bec4bd55cc4ccf0acac8e18c0c6121f5027aebd44438a81f
                                  • Instruction ID: d22651b824a9dcc27ed8a3983426188770e59c2792dec55b339c490717ece8d0
                                  • Opcode Fuzzy Hash: 0df56b3ea47fb749bec4bd55cc4ccf0acac8e18c0c6121f5027aebd44438a81f
                                  • Instruction Fuzzy Hash: 54B09B705457459BC600DBE15C4D7143D14A544703B104069F04791151DE7450008F1E
                                  APIs
                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014DF
                                  • GetProcAddress.KERNEL32(00000000), ref: 004014E6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID: GetLastInputInfo$User32.dll
                                  • API String ID: 2574300362-1519888992
                                  • Opcode ID: dda8da8e992a33b18976b493c6326eaa7f3d62003a83836ab2f58572c3d9c97a
                                  • Instruction ID: 0ec815453ed4bd5b2a0753acad69ff197eebc14e76dec883dd33c8fab126b773
                                  • Opcode Fuzzy Hash: dda8da8e992a33b18976b493c6326eaa7f3d62003a83836ab2f58572c3d9c97a
                                  • Instruction Fuzzy Hash: EDB092B19827449FC7006BE0AD8DA263A64B654B43729006BF04BE51A1EEB890009A1F
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __alldvrm$_strrchr
                                  • String ID:
                                  • API String ID: 1036877536-0
                                  • Opcode ID: af13233f64bff1d952fd16752439a8415c6481e4108584e155c4282d62de78f9
                                  • Instruction ID: 0b1f6a9dfc50a2d3a5cef35921af3bd2f2baba9a31ad448e356136b6fbdd55d0
                                  • Opcode Fuzzy Hash: af13233f64bff1d952fd16752439a8415c6481e4108584e155c4282d62de78f9
                                  • Instruction Fuzzy Hash: 3AA14532A042869FFB258E18C8817AFBBA1EF15354F1841AFE8859B382C67C8D41D758
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: 74ece5ab94bf9e1454a637eee9e3d981c9d933d52cb43566ce5b815ebd6edde4
                                  • Instruction ID: 0bd1fcef5d7791e57e96aa6a4775832058b0444fd7bffa6098b49987863132bf
                                  • Opcode Fuzzy Hash: 74ece5ab94bf9e1454a637eee9e3d981c9d933d52cb43566ce5b815ebd6edde4
                                  • Instruction Fuzzy Hash: 64415D31900F00ABEF227AB98C9667F3A75DF01775F14411FFC1896293D63C890986AA
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 06f5741e10c63ae8bf02417847894b944428abddfdd2a378d9b946abe0f64cd5
                                  • Instruction ID: 88518833c1d7008d36d723bd78668d328a40e80baed6ee8e3f57c0ed0377fbed
                                  • Opcode Fuzzy Hash: 06f5741e10c63ae8bf02417847894b944428abddfdd2a378d9b946abe0f64cd5
                                  • Instruction Fuzzy Hash: FE413AB1A00704BFE7249F39CC41BAABBA8EB84718F10412FF405DB291D379A9418788
                                  APIs
                                  Strings
                                  • Cleared browsers logins and cookies., xrefs: 0040B8EF
                                  • [Cleared browsers logins and cookies.], xrefs: 0040B8DE
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                  • API String ID: 3472027048-1236744412
                                  • Opcode ID: d9707e60554bfc1585fd29d1d0c4259e84f5b786bd47530d29b1ffdd516c0e4d
                                  • Instruction ID: 247d09dce9e3c977c7e86e48a76dae703d52755688f8fe644b587970fcea700c
                                  • Opcode Fuzzy Hash: d9707e60554bfc1585fd29d1d0c4259e84f5b786bd47530d29b1ffdd516c0e4d
                                  • Instruction Fuzzy Hash: FE31A81124C38069CA117B7514167AB6F958A93754F08847FE8C4273E3DB7A480883EF
                                  APIs
                                    • Part of subcall function 0041B8F1: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041B901
                                    • Part of subcall function 0041B8F1: GetWindowTextLengthW.USER32(00000000), ref: 0041B90A
                                    • Part of subcall function 0041B8F1: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041B934
                                  • Sleep.KERNEL32(000001F4), ref: 00409C95
                                  • Sleep.KERNEL32(00000064), ref: 00409D1F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$SleepText$ForegroundLength
                                  • String ID: [ $ ]
                                  • API String ID: 3309952895-93608704
                                  • Opcode ID: a49d20d3ecb8acddbd4132256805943c56c930b2d695a3c4727dac55219dcbc1
                                  • Instruction ID: 7bed66d096a43dd94c2219bc8d3cdd3a5a7df98386a17a5ae9bf36b343ab91a8
                                  • Opcode Fuzzy Hash: a49d20d3ecb8acddbd4132256805943c56c930b2d695a3c4727dac55219dcbc1
                                  • Instruction Fuzzy Hash: AF119F315042009BD218BB26DC17AAEBBA8AF41708F40047FF542621D3EF79AA1986DE
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0179cd47eff8c75336d676f059f6bc7958f0419c29ca715f1c911511461a8d64
                                  • Instruction ID: b58c8eca075ef28bddc965f0bc4d2171c3ec1f8ef65ef5096018edf4bb449d44
                                  • Opcode Fuzzy Hash: 0179cd47eff8c75336d676f059f6bc7958f0419c29ca715f1c911511461a8d64
                                  • Instruction Fuzzy Hash: 2501F2B26093163EF61016796CC1F27671CEF417B8BB1032BB626612D2EEA88C46606D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 112e7316d96929b625426bf143e83baabee3255260599eba4999be5de9cde10c
                                  • Instruction ID: 7fe3e8edc5bbc175eb6928fc2517c3e9b6b95ea9c4057c88a91cd5d3c4beb3ed
                                  • Opcode Fuzzy Hash: 112e7316d96929b625426bf143e83baabee3255260599eba4999be5de9cde10c
                                  • Instruction Fuzzy Hash: F201F9B22096167EB61016796DC4D27676DEF813B83F1033BF421612D1EEA8CC44A179
                                  APIs
                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 0043831F
                                    • Part of subcall function 0043826C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043829B
                                    • Part of subcall function 0043826C: ___AdjustPointer.LIBCMT ref: 004382B6
                                  • _UnwindNestedFrames.LIBCMT ref: 00438334
                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438345
                                  • CallCatchBlock.LIBVCRUNTIME ref: 0043836D
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                  • String ID:
                                  • API String ID: 737400349-0
                                  • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                  • Instruction ID: 0bcd00d322a0ad7a372b2cc4a74953bc209b0d499cbe7a3061e5fba3b10c2df3
                                  • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                  • Instruction Fuzzy Hash: 3E014072100248BBDF126E96CC41DEF7B69EF4C758F04501DFE4866221D73AE861DBA4
                                  APIs
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue), ref: 00447452
                                  • GetLastError.KERNEL32(?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue,0045E328,FlsSetValue,00000000,00000364,?,004471A1), ref: 0044745E
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004473C7,00000000,00000000,00000000,00000000,?,004476F3,00000006,FlsSetValue,0045E328,FlsSetValue,00000000), ref: 0044746C
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID:
                                  • API String ID: 3177248105-0
                                  • Opcode ID: bca6965db1f65f3d9859255c05e5b0128703451981dee5a4eba808798ce175cf
                                  • Instruction ID: 55721a836d87515a1eea2a56d4c7bce34062b93f94d6470a2cb527c4f3a692dc
                                  • Opcode Fuzzy Hash: bca6965db1f65f3d9859255c05e5b0128703451981dee5a4eba808798ce175cf
                                  • Instruction Fuzzy Hash: 6D01FC326497366BD7314F789C44A777FD8AF047617114535F906E3241DF28D802C6E8
                                  APIs
                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B83E
                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B852
                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B877
                                  • CloseHandle.KERNEL32(00000000), ref: 0041B885
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleReadSize
                                  • String ID:
                                  • API String ID: 3919263394-0
                                  • Opcode ID: 1a21255b847fbe2e331c6b2f646a75e08c9959ae533a89512b896340747af4bf
                                  • Instruction ID: 2a104a3335fe37b36386f9496d9e2b25d881a91c22a4f34d2042fa75e5cfbfce
                                  • Opcode Fuzzy Hash: 1a21255b847fbe2e331c6b2f646a75e08c9959ae533a89512b896340747af4bf
                                  • Instruction Fuzzy Hash: 47F0C2B12422047FE6102F25AC89FBF3A5CDB86BA9F10023EF801A2291DE258C0581B9
                                  APIs
                                  • GetSystemMetrics.USER32(0000004C), ref: 0041870F
                                  • GetSystemMetrics.USER32(0000004D), ref: 00418715
                                  • GetSystemMetrics.USER32(0000004E), ref: 0041871B
                                  • GetSystemMetrics.USER32(0000004F), ref: 00418721
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MetricsSystem
                                  • String ID:
                                  • API String ID: 4116985748-0
                                  • Opcode ID: 0409876626ed8831e64dc81abc3b09ac1b97839c455807a5cfaaf12ce600e90b
                                  • Instruction ID: 0d34e4fe417a410293abd419840fb627d3fd172a5f9f2d4f3f0ee0adad43daa0
                                  • Opcode Fuzzy Hash: 0409876626ed8831e64dc81abc3b09ac1b97839c455807a5cfaaf12ce600e90b
                                  • Instruction Fuzzy Hash: 26F0D672B043215BCB00AB754C4596EBB969FC03A4F25083FFA159B381EE78EC4687D9
                                  APIs
                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B5A0
                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B5B3
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B5DE
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B5E6
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandleOpenProcess
                                  • String ID:
                                  • API String ID: 39102293-0
                                  • Opcode ID: ef8d0d82becda269430901369212c52b3606b15fcf963f3a122b886808132bbc
                                  • Instruction ID: 5d23c8c1f4703883972a4236376900cac23e2486f01e1b2fafccabe2f4d6955e
                                  • Opcode Fuzzy Hash: ef8d0d82becda269430901369212c52b3606b15fcf963f3a122b886808132bbc
                                  • Instruction Fuzzy Hash: D5F049712003167BD31167558C4AFABB66ECF40B9AF01002BF611E21A2EF74DDC146BD
                                  APIs
                                  • __startOneArgErrorHandling.LIBCMT ref: 0044217D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorHandling__start
                                  • String ID: pow
                                  • API String ID: 3213639722-2276729525
                                  • Opcode ID: 520362507bef941fab5cffea9abde62870a3d8c74bbf2bfcbae46fc27f337450
                                  • Instruction ID: 9e1bbc3390eeabea57be79b34f62796538476165ffe421cdb5ba0d05f4dc7be1
                                  • Opcode Fuzzy Hash: 520362507bef941fab5cffea9abde62870a3d8c74bbf2bfcbae46fc27f337450
                                  • Instruction Fuzzy Hash: 7251AF61A0A20297F7557B15CE8137B2B90EB50741F684D6BF085423E9EB7CCC819F4E
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _memcmp
                                  • String ID: <kG$<kG
                                  • API String ID: 2931989736-383723866
                                  • Opcode ID: 58c4fa67fcc1ef55b25e11fe25224a60e8cc80dd1f406c27b0d1804dfa06d578
                                  • Instruction ID: 841d78c923fca9e627808cf77cab3bf97fcfd39527adbe47470f5cf9fadca134
                                  • Opcode Fuzzy Hash: 58c4fa67fcc1ef55b25e11fe25224a60e8cc80dd1f406c27b0d1804dfa06d578
                                  • Instruction Fuzzy Hash: 9F613471604B0A9ED710DF28D8806A6B7A5FF18304F440A3FEC5CCF656E3B8A955C7A9
                                  APIs
                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                    • Part of subcall function 004041F1: socket.WS2_32(?,00000001,00000006), ref: 00404212
                                    • Part of subcall function 0040428C: connect.WS2_32(?,?,?), ref: 004042A5
                                    • Part of subcall function 0041B8B5: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041B8CA
                                    • Part of subcall function 00404468: send.WS2_32(?,00000000,00000000,00000000), ref: 004044FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                  • String ID: pQG$NG
                                  • API String ID: 2334542088-921107917
                                  • Opcode ID: 982eeafb1624009b99b4778d687046f39171ec3ca1bbf21b26c504755b38db63
                                  • Instruction ID: 713adcd63a50277e86c853b9c7bd1a900ae8bd87492a3ad9f31fb308660c5d8e
                                  • Opcode Fuzzy Hash: 982eeafb1624009b99b4778d687046f39171ec3ca1bbf21b26c504755b38db63
                                  • Instruction Fuzzy Hash: BB5141321082405AC365F775D8A2AEF73E5AFD4308F50483FF84A671E2EE789949C69D
                                  APIs
                                  • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DD69
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Info
                                  • String ID: $vD
                                  • API String ID: 1807457897-3636070802
                                  • Opcode ID: af2dbb740455362532db4c6e27cef1bba8ecc5757f530743f693fef6f10ca257
                                  • Instruction ID: 6a53932102cf2f29093c464eb4c67803ff3648b28b3ba8b7d074bec3f8911faa
                                  • Opcode Fuzzy Hash: af2dbb740455362532db4c6e27cef1bba8ecc5757f530743f693fef6f10ca257
                                  • Instruction Fuzzy Hash: D0415DB0D047489BEF218E24CC84AF6BBF9DF55708F2404EEE58A87142D239AD45DF65
                                  APIs
                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450D49,?,00000050,?,?,?,?,?), ref: 00450BC9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: ACP$OCP
                                  • API String ID: 0-711371036
                                  • Opcode ID: 6fd782f53c9633299fe98566c4ec68ed2bffd726811d49864d22e4fe4dac6dcd
                                  • Instruction ID: d29bb87f3b47b124c8bd6c760bb86eb4cd4ec0f84f402c6b2e0ab732353f73f5
                                  • Opcode Fuzzy Hash: 6fd782f53c9633299fe98566c4ec68ed2bffd726811d49864d22e4fe4dac6dcd
                                  • Instruction Fuzzy Hash: 4021F72AA00105A6E7308FD48C82B977396AB50B1BF564467ED09D7303F73AFD09C358
                                  APIs
                                  • GetLocalTime.KERNEL32(?,00474EE0,004755B0,?,?,?,?,?,?,?,00414F0F,?,00000001,0000004C,00000000), ref: 004049F1
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  • GetLocalTime.KERNEL32(?,00474EE0,004755B0,?,?,?,?,?,?,?,00414F0F,?,00000001,0000004C,00000000), ref: 00404A4E
                                  Strings
                                  • KeepAlive | Enabled | Timeout: , xrefs: 004049E5
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime
                                  • String ID: KeepAlive | Enabled | Timeout:
                                  • API String ID: 481472006-1507639952
                                  • Opcode ID: 34116a3e6a9dff68a72d528d343cbcc7b7b4a675a09f341a66012f2f47d65158
                                  • Instruction ID: 07f09c1926c096f578aeb4a964dedba27d52497869334d5e310e707c12b0f234
                                  • Opcode Fuzzy Hash: 34116a3e6a9dff68a72d528d343cbcc7b7b4a675a09f341a66012f2f47d65158
                                  • Instruction Fuzzy Hash: 932131B1A042806BD600F77A980635B7B9497C4314F84043FE90C562E2EEBD59898BAF
                                  APIs
                                  • GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime
                                  • String ID: | $%02i:%02i:%02i:%03i
                                  • API String ID: 481472006-2430845779
                                  • Opcode ID: b44bc12ebc0c8248c01ea024d65dd69e294d9470b820f52aacd038fd9b485a5a
                                  • Instruction ID: bea5c42f2d95e84a76b62dfc34e9438b8882b4e2d456746f57979f9b7964cbe7
                                  • Opcode Fuzzy Hash: b44bc12ebc0c8248c01ea024d65dd69e294d9470b820f52aacd038fd9b485a5a
                                  • Instruction Fuzzy Hash: 0F114C725082405BC704EBA5D8969BF77E8AB94708F10093FF885A31E1EF38DA44C69E
                                  APIs
                                    • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040A884
                                    • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                    • Part of subcall function 0041A891: GetLocalTime.KERNEL32(00000000), ref: 0041A8AB
                                  • CloseHandle.KERNEL32(?), ref: 0040A7CA
                                  • UnhookWindowsHookEx.USER32 ref: 0040A7DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                  • String ID: Online Keylogger Stopped
                                  • API String ID: 1623830855-1496645233
                                  • Opcode ID: db067009e978c816aec669a3f6746f2705b7ae1ea2e8a2529e59c65f3a42714d
                                  • Instruction ID: da65c2120251a34d34924486d515db36f90714a8cba0a7d82e96ebed52376b78
                                  • Opcode Fuzzy Hash: db067009e978c816aec669a3f6746f2705b7ae1ea2e8a2529e59c65f3a42714d
                                  • Instruction Fuzzy Hash: 5901F131A043019BCB25BB35C80B7AEBBB19B45314F40406EE441225D2EB7999A6C3DF
                                  APIs
                                  • waveInPrepareHeader.WINMM(?,00000020,?,?,00000000,00476B98,00474EE0,?,00000000,00401913), ref: 00401747
                                  • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401913), ref: 0040175D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: wave$BufferHeaderPrepare
                                  • String ID: XMG
                                  • API String ID: 2315374483-813777761
                                  • Opcode ID: ddcf6375f784c1628b927c4ebd910bbcf649a7619fcf77736d7f3a05f195dab6
                                  • Instruction ID: 26799fbdff8c3ec01ad48014b311b0d3f370155dffc0330205344997a7b0d52a
                                  • Opcode Fuzzy Hash: ddcf6375f784c1628b927c4ebd910bbcf649a7619fcf77736d7f3a05f195dab6
                                  • Instruction Fuzzy Hash: 6501AD71300300AFD7209F39ED45A69BBB5EF89315B00413EB808E33A2EB74AC50CB98
                                  APIs
                                  • IsValidLocale.KERNEL32(00000000,z?D,00000000,00000001,?,?,00443F7A,?,?,?,?,00000004), ref: 004479EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LocaleValid
                                  • String ID: IsValidLocaleName$z?D
                                  • API String ID: 1901932003-2490211753
                                  • Opcode ID: 030ca6b5b062e3e6eb463140e6e5805cf12db518d0019a9c378278714199a4d0
                                  • Instruction ID: 892bc6e93789200f6c95030ba230210178196c8f1f686432b442ac7872abfc60
                                  • Opcode Fuzzy Hash: 030ca6b5b062e3e6eb463140e6e5805cf12db518d0019a9c378278714199a4d0
                                  • Instruction Fuzzy Hash: 06F0E930645218B7DB186F258C06F5E7B95CB05716F50807BFC047A293DE794E0295DD
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID: XMG$XMG
                                  • API String ID: 3519838083-886261599
                                  • Opcode ID: 94d942c2b9cd7cd452367b65107360caec8e392a141153fe325b9bee2a1bda9b
                                  • Instruction ID: 0a877421dfc5135a28098138b17ad9f721677e320a6d1c8a6a2adbe775497da7
                                  • Opcode Fuzzy Hash: 94d942c2b9cd7cd452367b65107360caec8e392a141153fe325b9bee2a1bda9b
                                  • Instruction Fuzzy Hash: D4F0E9B1B00211ABC715BB65880569EB768EF41369F01827FB416772E1CFBD5D04975C
                                  APIs
                                  • GetKeyState.USER32(00000011), ref: 0040AD5B
                                    • Part of subcall function 00409B10: GetForegroundWindow.USER32(?,?,00475108), ref: 00409B3F
                                    • Part of subcall function 00409B10: GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                    • Part of subcall function 00409B10: GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                    • Part of subcall function 00409B10: GetKeyState.USER32(00000010), ref: 00409B5C
                                    • Part of subcall function 00409B10: GetKeyboardState.USER32(?,?,00475108), ref: 00409B67
                                    • Part of subcall function 00409B10: ToUnicodeEx.USER32(0047515C,?,?,?,00000010,00000000,00000000), ref: 00409B8A
                                    • Part of subcall function 00409B10: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 00409BE3
                                    • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,?,0040AF3F,?,?,?,?,?,00000000), ref: 00409D84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                  • String ID: [AltL]$[AltR]
                                  • API String ID: 2738857842-2658077756
                                  • Opcode ID: 1deea0a1754c58beabcfa893467cad3df36da0ab1922093d88c83ef84dbcd496
                                  • Instruction ID: 4c389cf0edc94a27bb3bc0fddc987b72c0da48b50f0a0a77cbfc03dd010ffeca
                                  • Opcode Fuzzy Hash: 1deea0a1754c58beabcfa893467cad3df36da0ab1922093d88c83ef84dbcd496
                                  • Instruction Fuzzy Hash: 9AE09B2134032117C898323EA91B6EE3A218F82F65B80016FF8427BADADD7D4D5043CF
                                  APIs
                                  • _free.LIBCMT ref: 00448A35
                                    • Part of subcall function 00446CD5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A), ref: 00446CEB
                                    • Part of subcall function 00446CD5: GetLastError.KERNEL32(0000000A,?,0044FC60,0000000A,00000000,0000000A,00000000,?,0044FF04,0000000A,00000007,0000000A,?,00450415,0000000A,0000000A), ref: 00446CFD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFreeHeapLast_free
                                  • String ID: 8@$8@
                                  • API String ID: 1353095263-3408345419
                                  • Opcode ID: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                  • Instruction ID: 8fe4af4b93ebf6b2b13329648f525de20a5552277f2be9521e73d3219e6c2dc0
                                  • Opcode Fuzzy Hash: 9a963da6b0d453c70d37714207bd95daf40472698ea915a46c6a843fe12f4396
                                  • Instruction Fuzzy Hash: 01E092361003059F8720CF6DD400A86B7F4EF95720720852FE89EE3710D731E812CB40
                                  APIs
                                  • GetKeyState.USER32(00000012), ref: 0040ADB5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: State
                                  • String ID: [CtrlL]$[CtrlR]
                                  • API String ID: 1649606143-2446555240
                                  • Opcode ID: f1664d460506ce6a307028f778898136177a0e582b30a514b3a67480cfc74d29
                                  • Instruction ID: c178b64a75e50e2fccb38c9379e001e6e5e0f6b670105b82eaba8ba361dc1658
                                  • Opcode Fuzzy Hash: f1664d460506ce6a307028f778898136177a0e582b30a514b3a67480cfc74d29
                                  • Instruction Fuzzy Hash: 59E0866170031517C514363DD61B67F39128F41B66F80012FF842A7AC6ED7E8D6423CB
                                  APIs
                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004752F0,00475308,?,pth_unenc), ref: 00412A60
                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412A70
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412A5E
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteOpenValue
                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                  • API String ID: 2654517830-1051519024
                                  • Opcode ID: 3a238ae8f5602ce2402de7cae663a0db3b4178bc362611f3100633d001d48757
                                  • Instruction ID: 27182704b7fa20b5ed2a2764b3d23dc9a6b68b829b0f6622ee10c7d45645f89b
                                  • Opcode Fuzzy Hash: 3a238ae8f5602ce2402de7cae663a0db3b4178bc362611f3100633d001d48757
                                  • Instruction Fuzzy Hash: F1E01270200308BAEF204FA19E06FEB37ACAB40BC9F004169F601F5191EAB6DD54A658
                                  APIs
                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteDirectoryFileRemove
                                  • String ID: pth_unenc
                                  • API String ID: 3325800564-4028850238
                                  • Opcode ID: dec08f300a5f428fa5c47b7bc45a3e83a5999c060828e280beeb3790875544bf
                                  • Instruction ID: b030a41f26c3d5f2e51690188d4bb45887e11e7cc62b1c698fc8f7347c957287
                                  • Opcode Fuzzy Hash: dec08f300a5f428fa5c47b7bc45a3e83a5999c060828e280beeb3790875544bf
                                  • Instruction Fuzzy Hash: 12E046715116104BC610AB32E845AEBB798AB05306F00446FE8D3B36A1DE38A948CA98
                                  APIs
                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E748), ref: 00411781
                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 00411794
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ObjectProcessSingleTerminateWait
                                  • String ID: pth_unenc
                                  • API String ID: 1872346434-4028850238
                                  • Opcode ID: 5bb4d910bf534706ca5f2b5d32154bdbdc32722f36a2c9cc9993c004b7262cc3
                                  • Instruction ID: eef26e02e81300ba4c8cf7f61278c3f59c29627b67378ac59a4e73c1cb1fd9d7
                                  • Opcode Fuzzy Hash: 5bb4d910bf534706ca5f2b5d32154bdbdc32722f36a2c9cc9993c004b7262cc3
                                  • Instruction Fuzzy Hash: 24D01234145351AFD7610B60AD19F953F68E705323F108365F428512F1CFB58494AA1C
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401AD8), ref: 0043FD37
                                  • GetLastError.KERNEL32 ref: 0043FD45
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043FDA0
                                  Memory Dump Source
                                  • Source File: 00000006.00000002.3779879332.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_6_2_400000_P87unxnF4t4DSrTt43.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$ErrorLast
                                  • String ID:
                                  • API String ID: 1717984340-0
                                  • Opcode ID: da5cee2afb3fc4b5b183086853f31dabd9e5fae04dd03cb90eeff65bb8952867
                                  • Instruction ID: a8021b2984f9c2011c4d4eba480f75da6e6c35d7fa760b83b06315d7a0ea6bca
                                  • Opcode Fuzzy Hash: da5cee2afb3fc4b5b183086853f31dabd9e5fae04dd03cb90eeff65bb8952867
                                  • Instruction Fuzzy Hash: E1410A30E00246AFCF218F65C84867B7BA5EF09310F14517EFC5A9B2A2DB398D05C759