Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tu.exe

Overview

General Information

Sample name:tu.exe
Analysis ID:1428245
MD5:de717951989420c6b9790c9160a23d35
SHA1:df8621b3d9fa7e4e1d511d6ff732457aac6a0a1d
SHA256:d434e12726aee7ad7378dc4e395dd5f8fba6255546eef9e1dbb51d52d966af2c
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
C2 URLs / IPs found in malware configuration
Contains functionality to infect the boot sector
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
Installs a global keyboard hook
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • tu.exe (PID: 5412 cmdline: "C:\Users\user\Desktop\tu.exe" MD5: DE717951989420C6B9790C9160A23D35)
    • tu.exe (PID: 4256 cmdline: "C:\Users\user\Desktop\tu.exe" MD5: DE717951989420C6B9790C9160A23D35)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "abril18.con-ip.com:7770:1", "Assigned name": "ALETEO", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-PO8SC5", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000005.00000002.4585822426.00000000024CF000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
            Click to see the 17 entries
            SourceRuleDescriptionAuthorStrings
            5.2.tu.exe.550000.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              5.2.tu.exe.550000.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                5.2.tu.exe.550000.1.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6c4a8:$a1: Remcos restarted by watchdog!
                • 0x6ca20:$a3: %02i:%02i:%02i:%03i
                5.2.tu.exe.550000.1.raw.unpackREMCOS_RAT_variantsunknownunknown
                • 0x664fc:$str_a1: C:\Windows\System32\cmd.exe
                • 0x66478:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x66478:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x66978:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x671a8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x6656c:$str_b2: Executing file:
                • 0x675ec:$str_b3: GetDirectListeningPort
                • 0x66f98:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x67118:$str_b7: \update.vbs
                • 0x66594:$str_b9: Downloaded file:
                • 0x66580:$str_b10: Downloading file:
                • 0x66624:$str_b12: Failed to upload file:
                • 0x675b4:$str_b13: StartForward
                • 0x675d4:$str_b14: StopForward
                • 0x67070:$str_b15: fso.DeleteFile "
                • 0x67004:$str_b16: On Error Resume Next
                • 0x670a0:$str_b17: fso.DeleteFolder "
                • 0x66614:$str_b18: Uploaded file:
                • 0x665d4:$str_b19: Unable to delete:
                • 0x67038:$str_b20: while fso.FileExists("
                • 0x66ab1:$str_c0: [Firefox StoredLogins not found]
                5.2.tu.exe.550000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                • 0x663e8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                • 0x6637c:$s1: CoGetObject
                • 0x66390:$s1: CoGetObject
                • 0x663ac:$s1: CoGetObject
                • 0x70338:$s1: CoGetObject
                • 0x6633c:$s2: Elevation:Administrator!new:
                Click to see the 29 entries

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Documents\ChromeUpdate\SentinelOne.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\tu.exe, ProcessId: 5412, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SentinelOneIsCrap

                Stealing of Sensitive Information

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\tu.exe, ProcessId: 4256, TargetFilename: C:\ProgramData\remcos\logs.dat
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                Source: 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "abril18.con-ip.com:7770:1", "Assigned name": "ALETEO", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-PO8SC5", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4585822426.00000000024CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTR
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00583837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,5_2_00583837
                Source: tu.exeBinary or memory string: -----BEGIN PUBLIC KEY-----

                Exploits

                barindex
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005574FD _wcslen,CoGetObject,5_2_005574FD
                Source: tu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: tu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\vmagent_new\bin\joblist\222359\out\Release\360AdvToolExecutor.pdbpF source: tu.exe, SentinelOne.exe.0.dr
                Source: Binary string: C:\vmagent_new\bin\joblist\222359\out\Release\360AdvToolExecutor.pdb source: tu.exe, SentinelOne.exe.0.dr
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00559253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_00559253
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,5_2_0056C291
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,5_2_0055C34D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00559665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_00559665
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0059E879 FindFirstFileExA,5_2_0059E879
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,5_2_0055880C
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055783C FindFirstFileW,FindNextFileW,5_2_0055783C
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00569AF5 FindFirstFileW,FindNextFileW,FindNextFileW,5_2_00569AF5
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,5_2_0055BB30
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,5_2_0055BD37
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00557C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,5_2_00557C97

                Networking

                barindex
                Source: Malware configuration extractorURLs: abril18.con-ip.com
                Source: global trafficTCP traffic: 192.168.2.6:49721 -> 179.14.10.110:7770
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: ColombiaMovilCO ColombiaMovilCO
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,5_2_0056B380
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: unknownDNS traffic detected: queries for: abril18.con-ip.com
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://.inihttps://map/set
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://certificates.godaddy.com/repository/0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://certs.godaddy.com/repository/1301
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://crl.globalsign.net/root.crl0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://crl.godaddy.com/gdig2s5-6.crl0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://down.360safe.com/360zip_setup.exe360SysReset
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://down.360safe.com/setup.exeIsBetaVersion360ver.dllSOFTWARE
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exe
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                Source: tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/;
                Source: tu.exe, 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: tu.exe, 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, tu.exe, 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, tu.exe, 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpJ
                Source: tu.exe, 00000005.00000003.2347351969.0000000000937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpK
                Source: tu.exe, 00000005.00000003.2347351969.0000000000937000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpQ
                Source: tu.exe, 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpT
                Source: tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpalF
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpl
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://ocsp.godaddy.com/0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://ocsp.godaddy.com/05
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: https://certs.godaddy.com/repository/0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                Source: tu.exe, SentinelOne.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/03

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055A2B8 SetWindowsHookExA 0000000D,0055A2A4,000000005_2_0055A2B8
                Source: C:\Users\user\Desktop\tu.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\tu.exeJump to behavior
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055B70E OpenClipboard,GetClipboardData,CloseClipboard,5_2_0055B70E
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005668C1 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,5_2_005668C1
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055B70E OpenClipboard,GetClipboardData,CloseClipboard,5_2_0055B70E
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,5_2_0055A3E0

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4585822426.00000000024CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTR

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056C9E2 SystemParametersInfoW,5_2_0056C9E2

                System Summary

                barindex
                Source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\Desktop\tu.exeFile dump: SentinelOne.exe.0.dr 800000000Jump to dropped file
                Source: C:\Users\user\Desktop\tu.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004115E1 NtQueryDefaultLocale,0_2_004115E1
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00406279: CreateFileA,_memset,DeviceIoControl,CloseHandle,0_2_00406279
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005667B4 ExitWindowsEx,LoadLibraryA,GetProcAddress,5_2_005667B4
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042B5250_2_0042B525
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004115E10_2_004115E1
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004125830_2_00412583
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004070100_2_00407010
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040E0200_2_0040E020
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040E0240_2_0040E024
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004550310_2_00455031
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004561600_2_00456160
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0044A29E0_2_0044A29E
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040D2A80_2_0040D2A8
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0043F34D0_2_0043F34D
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040E36C0_2_0040E36C
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0041236C0_2_0041236C
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042B4410_2_0042B441
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004284860_2_00428486
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004124AF0_2_004124AF
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004555750_2_00455575
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042A5710_2_0042A571
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004405330_2_00440533
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040D6080_2_0040D608
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004286130_2_00428613
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040D62D0_2_0040D62D
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040F6950_2_0040F695
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004457320_2_00445732
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004127ED0_2_004127ED
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040D7FF0_2_0040D7FF
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040F8F30_2_0040F8F3
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040D8820_2_0040D882
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042788F0_2_0042788F
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040D8920_2_0040D892
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042B8B90_2_0042B8B9
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004389500_2_00438950
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040F9040_2_0040F904
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042991A0_2_0042991A
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004569240_2_00456924
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00429A530_2_00429A53
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00426A6B0_2_00426A6B
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040FA080_2_0040FA08
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0044CAB80_2_0044CAB8
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00438B4E0_2_00438B4E
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00429B6A0_2_00429B6A
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00454B060_2_00454B06
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00459BC10_2_00459BC1
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00455BE00_2_00455BE0
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00407B900_2_00407B90
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0044EBBB0_2_0044EBBB
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00406D100_2_00406D10
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00455E5B0_2_00455E5B
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040DE670_2_0040DE67
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040CE0C0_2_0040CE0C
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040CE130_2_0040CE13
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040CE280_2_0040CE28
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00433E860_2_00433E86
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040CE870_2_0040CE87
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00403E900_2_00403E90
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00426E9F0_2_00426E9F
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040DF690_2_0040DF69
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00411F130_2_00411F13
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040DFF60_2_0040DFF6
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00429FFD0_2_00429FFD
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040F0025_2_0040F002
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004070105_2_00407010
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D01B5_2_0040D01B
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040F0235_2_0040F023
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004561605_2_00456160
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D19C5_2_0040D19C
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004121AA5_2_004121AA
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D2D35_2_0040D2D3
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0044A29E5_2_0044A29E
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D2A85_2_0040D2A8
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004112B95_2_004112B9
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0043F34D5_2_0043F34D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D3EA5_2_0040D3EA
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004124AF5_2_004124AF
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004555755_2_00455575
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004405335_2_00440533
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D6785_2_0040D678
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040F6955_2_0040F695
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004457325_2_00445732
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004127ED5_2_004127ED
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D7FF5_2_0040D7FF
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004118D75_2_004118D7
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D8825_2_0040D882
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040D8925_2_0040D892
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040F8B15_2_0040F8B1
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004389505_2_00438950
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040F9045_2_0040F904
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004569245_2_00456924
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040FA085_2_0040FA08
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0044CAB85_2_0044CAB8
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00411ABC5_2_00411ABC
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00438B4E5_2_00438B4E
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00454B065_2_00454B06
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00459BC15_2_00459BC1
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00455BE05_2_00455BE0
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00407B905_2_00407B90
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0044EBBB5_2_0044EBBB
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00406D105_2_00406D10
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040EE495_2_0040EE49
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00455E5B5_2_00455E5B
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00433E865_2_00433E86
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00403E905_2_00403E90
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00410E9D5_2_00410E9D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00411F575_2_00411F57
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0040EF705_2_0040EF70
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00411F0D5_2_00411F0D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0058E0CC5_2_0058E0CC
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056F0FA5_2_0056F0FA
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005A41595_2_005A4159
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005881685_2_00588168
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005961F05_2_005961F0
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0058E2FB5_2_0058E2FB
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005A332B5_2_005A332B
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0057739D5_2_0057739D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005874E65_2_005874E6
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0058E5585_2_0058E558
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005887705_2_00588770
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005878FE5_2_005878FE
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005839465_2_00583946
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0059D9C95_2_0059D9C9
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00577A465_2_00577A46
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056DB625_2_0056DB62
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00577BAF5_2_00577BAF
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00587D335_2_00587D33
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00585E5E5_2_00585E5E
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00576E0E5_2_00576E0E
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0058DE9D5_2_0058DE9D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00563FCA5_2_00563FCA
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00586FEA5_2_00586FEA
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00433768 appears 56 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00584E10 appears 54 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00552093 appears 50 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00584770 appears 41 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00443C7F appears 38 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00408EE0 appears 68 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00551E65 appears 34 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 004322DC appears 96 times
                Source: C:\Users\user\Desktop\tu.exeCode function: String function: 00408AE0 appears 94 times
                Source: tu.exeStatic PE information: invalid certificate
                Source: tu.exeBinary or memory string: OriginalFilename vs tu.exe
                Source: tu.exe, 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameREGEDIT.EXEj% vs tu.exe
                Source: tu.exe, 00000000.00000000.2099392755.000000000046D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameREGEDIT.EXEj% vs tu.exe
                Source: tu.exe, 00000000.00000003.2276384508.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs tu.exe
                Source: tu.exe, 00000000.00000002.2312497564.0000000002589000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameREGEDIT.EXEj% vs tu.exe
                Source: tu.exe, 00000000.00000002.2312300285.00000000007DF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameD3D10Warp.dllj% vs tu.exe
                Source: tu.exe, 00000005.00000000.2310003818.000000000046D000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameREGEDIT.EXEj% vs tu.exe
                Source: tu.exeBinary or memory string: OriginalFilenameREGEDIT.EXEj% vs tu.exe
                Source: tu.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@3/3@3/2
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00408380 SetLastError,GetLastError,SetLastError,GetLastError,_wcsrchr,_wcsncpy,_strerror,MultiByteToWideChar,_wcsncpy,LoadLibraryW,LoadLibraryW,LoadLibraryW,LoadLibraryW,FormatMessageW,_wcstok,_vswprintf_s,_wcsncpy,GetSystemTime,LocalFree,FreeLibrary,0_2_00408380
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00567952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,5_2_00567952
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055F474 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,5_2_0055F474
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,5_2_0056B4A8
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,5_2_0056AA4A
                Source: C:\Users\user\Desktop\tu.exeFile created: C:\Users\user\Documents\ChromeUpdateJump to behavior
                Source: C:\Users\user\Desktop\tu.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-PO8SC5
                Source: tu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\tu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\Desktop\tu.exeFile read: C:\Users\user\Desktop\tu.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\tu.exe "C:\Users\user\Desktop\tu.exe"
                Source: C:\Users\user\Desktop\tu.exeProcess created: C:\Users\user\Desktop\tu.exe "C:\Users\user\Desktop\tu.exe"
                Source: C:\Users\user\Desktop\tu.exeProcess created: C:\Users\user\Desktop\tu.exe "C:\Users\user\Desktop\tu.exe"Jump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: k7rn7l32.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: ntd3ll.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: d3d9.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: d3d10warp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\tu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                Source: tu.exeStatic file information: File size 1340704 > 1048576
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: tu.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Source: tu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\vmagent_new\bin\joblist\222359\out\Release\360AdvToolExecutor.pdbpF source: tu.exe, SentinelOne.exe.0.dr
                Source: Binary string: C:\vmagent_new\bin\joblist\222359\out\Release\360AdvToolExecutor.pdb source: tu.exe, SentinelOne.exe.0.dr
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00447B97 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00447B97
                Source: tu.exeStatic PE information: real checksum: 0x798b9 should be: 0x154233
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00403180 push ecx; mov dword ptr [esp], 00000000h0_2_00403181
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00432321 push ecx; ret 0_2_00432334
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00403400 push ecx; mov dword ptr [esp], 00000000h0_2_00403401
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004140D0 push ecx; retf 5_2_004140A5
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004140A6 push ecx; retf 5_2_004140A5
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004140BB push ecx; retf 5_2_004140C1
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00403180 push ecx; mov dword ptr [esp], 00000000h5_2_00403181
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004152A0 push edi; retf 5_2_0041537A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00417356 push ecx; retf 5_2_0041750A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0041537B push edi; retf 5_2_0041537A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00432321 push ecx; ret 5_2_00432334
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00415390 push edi; retf 5_2_0041537A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0041539E push edi; retf 5_2_0041537A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00403400 push ecx; mov dword ptr [esp], 00000000h5_2_00403401
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00415432 push edi; retf 5_2_0041543F
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004154D3 push edi; retf 5_2_00415512
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0041750B push ecx; retf 5_2_0041750A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00417535 push ecx; retf 5_2_0041750A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0041E630 push ecx; retf 5_2_0041E631
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004136EA push ecx; retf 5_2_00413729
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00413746 push ecx; retf 5_2_00413729
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00418711 push ecx; retf 5_2_004188C7
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0041372A push ecx; retf 5_2_00413729
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004137D3 push edi; retf 5_2_004137E0
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004137BE push esp; retf 5_2_004137D2
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00413840 push ecx; retf 5_2_00413851
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00413867 push edi; retf 5_2_0041386D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004188C8 push ecx; retf 5_2_004188C7
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_004188F2 push ecx; retf 5_2_004188C7
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00415A8C push ecx; retf 5_2_00415A92
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00415AA8 push ecx; retf 5_2_00415AAE
                Source: tu.exeStatic PE information: section name: .text entropy: 6.861631705496741
                Source: SentinelOne.exe.0.drStatic PE information: section name: .text entropy: 6.861631705496741

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\tu.exeCode function: CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d0_2_00406279
                Source: C:\Users\user\Desktop\tu.exeCode function: RegQueryValueExW,_malloc,SetLastError,CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d0_2_00406210
                Source: C:\Users\user\Desktop\tu.exeCode function: CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d5_2_00406279
                Source: C:\Users\user\Desktop\tu.exeCode function: RegQueryValueExW,_malloc,SetLastError,CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d5_2_00406210
                Source: C:\Users\user\Desktop\tu.exeFile created: C:\Users\user\Documents\ChromeUpdate\SentinelOne.exeJump to dropped file
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00556EB0 ShellExecuteW,URLDownloadToFileW,5_2_00556EB0
                Source: C:\Users\user\Desktop\tu.exeFile created: C:\Users\user\Documents\ChromeUpdate\SentinelOne.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\tu.exeCode function: CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d0_2_00406279
                Source: C:\Users\user\Desktop\tu.exeCode function: RegQueryValueExW,_malloc,SetLastError,CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d0_2_00406210
                Source: C:\Users\user\Desktop\tu.exeCode function: CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d5_2_00406279
                Source: C:\Users\user\Desktop\tu.exeCode function: RegQueryValueExW,_malloc,SetLastError,CreateFileA,_memset,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d5_2_00406210
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056AA4A OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,5_2_0056AA4A
                Source: C:\Users\user\Desktop\tu.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SentinelOneIsCrapJump to behavior
                Source: C:\Users\user\Desktop\tu.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run SentinelOneIsCrapJump to behavior
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056CB50 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,5_2_0056CB50
                Source: C:\Users\user\Desktop\tu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055F7A7 Sleep,ExitProcess,5_2_0055F7A7
                Source: C:\Users\user\Desktop\tu.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,5_2_0056A748
                Source: C:\Users\user\Desktop\tu.exeWindow / User API: threadDelayed 9521Jump to behavior
                Source: C:\Users\user\Desktop\tu.exeWindow / User API: foregroundWindowGot 1745Jump to behavior
                Source: C:\Users\user\Desktop\tu.exeDropped PE file which has not been started: C:\Users\user\Documents\ChromeUpdate\SentinelOne.exeJump to dropped file
                Source: C:\Users\user\Desktop\tu.exeAPI coverage: 0.8 %
                Source: C:\Users\user\Desktop\tu.exeAPI coverage: 8.5 %
                Source: C:\Users\user\Desktop\tu.exe TID: 6712Thread sleep count: 137 > 30Jump to behavior
                Source: C:\Users\user\Desktop\tu.exe TID: 6712Thread sleep time: -68500s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\tu.exe TID: 2420Thread sleep count: 133 > 30Jump to behavior
                Source: C:\Users\user\Desktop\tu.exe TID: 2420Thread sleep time: -399000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\tu.exe TID: 2420Thread sleep count: 9521 > 30Jump to behavior
                Source: C:\Users\user\Desktop\tu.exe TID: 2420Thread sleep time: -28563000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00559253 __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_00559253
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,5_2_0056C291
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,5_2_0055C34D
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00559665 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,5_2_00559665
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0059E879 FindFirstFileExA,5_2_0059E879
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055880C __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,5_2_0055880C
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055783C FindFirstFileW,FindNextFileW,5_2_0055783C
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00569AF5 FindFirstFileW,FindNextFileW,FindNextFileW,5_2_00569AF5
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,5_2_0055BB30
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0055BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,5_2_0055BD37
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00557C97 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,5_2_00557C97
                Source: tu.exe, 00000005.00000003.2347351969.0000000000972000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000002.4579308792.0000000000972000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW<
                Source: tu.exe, 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000972000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000002.4579308792.0000000000972000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Users\user\Desktop\tu.exeAPI call chain: ExitProcess graph end nodegraph_5-78544
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042F43A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0042F43A
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040BB10 GetCurrentThreadId,GetProcessHeap,OpenThread,OpenThread,GetLastError,GetProcessHeap,HeapFree,OutputDebugStringW,CloseHandle,0_2_0040BB10
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00447B97 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,0_2_00447B97
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005932B5 mov eax, dword ptr fs:[00000030h]5_2_005932B5
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0040C050 GetProcessHeap,HeapAlloc,0_2_0040C050
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_0042F43A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0042F43A
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00430B49 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00430B49
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00414B51 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00414B51
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00435C77 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00435C77
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0042F43A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_0042F43A
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00430B49 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00430B49
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00435C77 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00435C77
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_005849F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_005849F9
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00584B47 SetUnhandledExceptionFilter,5_2_00584B47
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0058BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0058BB22
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00584FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00584FDC

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\tu.exeMemory written: C:\Users\user\Desktop\tu.exe base: 550000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\tu.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe5_2_005620F7
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_00569627 mouse_event,5_2_00569627
                Source: C:\Users\user\Desktop\tu.exeProcess created: C:\Users\user\Desktop\tu.exe "C:\Users\user\Desktop\tu.exe"Jump to behavior
                Source: tu.exe, 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\08
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\D
                Source: tu.exe, 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerQ
                Source: tu.exe, 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\
                Source: tu.exe, 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager_
                Source: tu.exe, 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\2V
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\2
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\25
                Source: tu.exe, 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager9
                Source: tu.exe, 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, logs.dat.5.drBinary or memory string: [Program Manager]
                Source: tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerC5\54
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00406100 cpuid 0_2_00406100
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,0_2_00454050
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,0_2_0044B1C1
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,0_2_0045322C
                Source: C:\Users\user\Desktop\tu.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_0044B2AE
                Source: C:\Users\user\Desktop\tu.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,0_2_004492AE
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,0_2_0044B351
                Source: C:\Users\user\Desktop\tu.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,0_2_0044B315
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,0_2_0044845E
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,0_2_00448411
                Source: C:\Users\user\Desktop\tu.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,0_2_0044842A
                Source: C:\Users\user\Desktop\tu.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,0_2_00449539
                Source: C:\Users\user\Desktop\tu.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_0044859D
                Source: C:\Users\user\Desktop\tu.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,0_2_004497FF
                Source: C:\Users\user\Desktop\tu.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00448C0D
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,0_2_0044ADCC
                Source: C:\Users\user\Desktop\tu.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,0_2_00435DAF
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,0_2_0044AEE3
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,0_2_0044AF7B
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,0_2_0044AFEF
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,5_2_00454050
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,5_2_0044B1C1
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,5_2_0045322C
                Source: C:\Users\user\Desktop\tu.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,5_2_0044B2AE
                Source: C:\Users\user\Desktop\tu.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,5_2_004492AE
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,5_2_0044B351
                Source: C:\Users\user\Desktop\tu.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,5_2_0044B315
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,5_2_0044845E
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,5_2_00448411
                Source: C:\Users\user\Desktop\tu.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,5_2_0044842A
                Source: C:\Users\user\Desktop\tu.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,5_2_00449539
                Source: C:\Users\user\Desktop\tu.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,5_2_0044859D
                Source: C:\Users\user\Desktop\tu.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,5_2_004497FF
                Source: C:\Users\user\Desktop\tu.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,5_2_00448C0D
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,5_2_0044ADCC
                Source: C:\Users\user\Desktop\tu.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,5_2_00435DAF
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,5_2_0044AEE3
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,5_2_0044AF7B
                Source: C:\Users\user\Desktop\tu.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,5_2_0044AFEF
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoA,5_2_0055F8D1
                Source: C:\Users\user\Desktop\tu.exeCode function: EnumSystemLocalesW,5_2_005A2036
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_005A20C3
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,5_2_005A2313
                Source: C:\Users\user\Desktop\tu.exeCode function: EnumSystemLocalesW,5_2_00598404
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_005A243C
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,5_2_005A2543
                Source: C:\Users\user\Desktop\tu.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_005A2610
                Source: C:\Users\user\Desktop\tu.exeCode function: GetLocaleInfoW,5_2_005988ED
                Source: C:\Users\user\Desktop\tu.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,5_2_005A1CD8
                Source: C:\Users\user\Desktop\tu.exeCode function: EnumSystemLocalesW,5_2_005A1F50
                Source: C:\Users\user\Desktop\tu.exeCode function: EnumSystemLocalesW,5_2_005A1F9B
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_00409120 GetCurrentThreadId,GetLocalTime,__swprintf,0_2_00409120
                Source: C:\Users\user\Desktop\tu.exeCode function: 5_2_0056B60D GetComputerNameExW,GetUserNameW,5_2_0056B60D
                Source: C:\Users\user\Desktop\tu.exeCode function: 0_2_004535C3 __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,0_2_004535C3
                Source: C:\Users\user\Desktop\tu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4585822426.00000000024CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTR
                Source: C:\Users\user\Desktop\tu.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data5_2_0055BA12
                Source: C:\Users\user\Desktop\tu.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\5_2_0055BB30
                Source: C:\Users\user\Desktop\tu.exeCode function: \key3.db5_2_0055BB30

                Remote Access Functionality

                barindex
                Source: C:\Users\user\Desktop\tu.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-PO8SC5Jump to behavior
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.23c0000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.46d672.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.tu.exe.550000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.tu.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4585822426.00000000024CF000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 5412, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: tu.exe PID: 4256, type: MEMORYSTR
                Source: C:\Users\user\Desktop\tu.exeCode function: cmd.exe5_2_0055569A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Bypass User Account Control
                3
                Obfuscated Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol211
                Input Capture
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                1
                Registry Run Keys / Startup Folder
                1
                Access Token Manipulation
                1
                Software Packing
                2
                Credentials In Files
                1
                System Service Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                Bootkit
                1
                Windows Service
                1
                DLL Side-Loading
                NTDS2
                File and Directory Discovery
                Distributed Component Object ModelInput Capture1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script122
                Process Injection
                1
                Bypass User Account Control
                LSA Secrets23
                System Information Discovery
                SSHKeylogging2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Registry Run Keys / Startup Folder
                1
                Masquerading
                Cached Domain Credentials31
                Security Software Discovery
                VNCGUI Input Capture12
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Virtualization/Sandbox Evasion
                DCSync1
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc Filesystem2
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt122
                Process Injection
                /etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Bootkit
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                tu.exe8%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://geoplugin.net/json.gp100%URL Reputationphishing
                http://geoplugin.net/json.gp/C100%URL Reputationphishing
                NameIPActiveMaliciousAntivirus DetectionReputation
                geoplugin.net
                178.237.33.50
                truefalse
                  unknown
                  abril18.con-ip.com
                  179.14.10.110
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gptrue
                    • URL Reputation: phishing
                    unknown
                    abril18.con-ip.comtrue
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://down.360safe.com/setup.exeIsBetaVersion360ver.dllSOFTWAREtu.exe, SentinelOne.exe.0.drfalse
                        high
                        http://crl.godaddy.com/gdroot-g2.crl0Ftu.exe, SentinelOne.exe.0.drfalse
                          high
                          http://geoplugin.net/json.gpalFtu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://crl.godaddy.com/gdig2s5-6.crl0tu.exe, SentinelOne.exe.0.drfalse
                              high
                              http://down.360safe.com/setup.exehttp://down.360safe.com/setupbeta.exetu.exe, SentinelOne.exe.0.drfalse
                                high
                                http://geoplugin.net/tu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://geoplugin.net/json.gp/Ctu.exe, 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, tu.exe, 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, tu.exe, 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmptrue
                                  • URL Reputation: phishing
                                  unknown
                                  http://geoplugin.net/json.gpltu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://geoplugin.net/json.gpKtu.exe, 00000005.00000003.2347351969.0000000000937000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://certificates.godaddy.com/repository/0tu.exe, SentinelOne.exe.0.drfalse
                                        high
                                        http://geoplugin.net/json.gpJtu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://certs.godaddy.com/repository/1301tu.exe, SentinelOne.exe.0.drfalse
                                            high
                                            http://geoplugin.net/json.gpTtu.exe, 00000005.00000002.4579308792.0000000000953000.00000004.00000020.00020000.00000000.sdmp, tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://geoplugin.net/json.gpQtu.exe, 00000005.00000003.2347351969.0000000000937000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://down.360safe.com/360zip_setup.exe360SysResettu.exe, SentinelOne.exe.0.drfalse
                                                  high
                                                  https://certs.godaddy.com/repository/0tu.exe, SentinelOne.exe.0.drfalse
                                                    high
                                                    http://.inihttps://map/settu.exe, SentinelOne.exe.0.drfalse
                                                      low
                                                      http://certificates.godaddy.com/repository/gdig2.crt0tu.exe, SentinelOne.exe.0.drfalse
                                                        high
                                                        http://geoplugin.net/json.gpSystem32tu.exe, 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://geoplugin.net/;tu.exe, 00000005.00000003.2347351969.0000000000953000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            unknown
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            179.14.10.110
                                                            abril18.con-ip.comColombia
                                                            27831ColombiaMovilCOtrue
                                                            178.237.33.50
                                                            geoplugin.netNetherlands
                                                            8455ATOM86-ASATOM86NLfalse
                                                            Joe Sandbox version:40.0.0 Tourmaline
                                                            Analysis ID:1428245
                                                            Start date and time:2024-04-18 18:15:00 +02:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 9m 11s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:11
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:tu.exe
                                                            Detection:MAL
                                                            Classification:mal100.rans.troj.spyw.expl.evad.winEXE@3/3@3/2
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 72%
                                                            • Number of executed functions: 85
                                                            • Number of non-executed functions: 352
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • VT rate limit hit for: tu.exe
                                                            TimeTypeDescription
                                                            18:16:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run SentinelOneIsCrap C:\Users\user\Documents\ChromeUpdate\SentinelOne.exe
                                                            18:16:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run SentinelOneIsCrap C:\Users\user\Documents\ChromeUpdate\SentinelOne.exe
                                                            18:16:47API Interceptor5917344x Sleep call for process: tu.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            178.237.33.50RFQ.NO. S70-23Q-1474-CS-P.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                            • geoplugin.net/json.gp
                                                            F873635427.vbsGet hashmaliciousRemcos, XWormBrowse
                                                            • geoplugin.net/json.gp
                                                            F873635427.vbsGet hashmaliciousRemcos, XWormBrowse
                                                            • geoplugin.net/json.gp
                                                            5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                                            • geoplugin.net/json.gp
                                                            awb_shipping_documents_17_04_2024_00000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • geoplugin.net/json.gp
                                                            EFEMACPedido0180040240418.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • geoplugin.net/json.gp
                                                            Quotation 20241804.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • geoplugin.net/json.gp
                                                            SecuriteInfo.com.Win32.RATX-gen.12024.12837.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • geoplugin.net/json.gp
                                                            DETAILS.docx.docGet hashmaliciousRemcosBrowse
                                                            • geoplugin.net/json.gp
                                                            Carlispa_Ordine_00401702400417.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • geoplugin.net/json.gp
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            geoplugin.netRFQ.NO. S70-23Q-1474-CS-P.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                            • 178.237.33.50
                                                            F873635427.vbsGet hashmaliciousRemcos, XWormBrowse
                                                            • 178.237.33.50
                                                            F873635427.vbsGet hashmaliciousRemcos, XWormBrowse
                                                            • 178.237.33.50
                                                            5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                                            • 178.237.33.50
                                                            awb_shipping_documents_17_04_2024_00000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • 178.237.33.50
                                                            EFEMACPedido0180040240418.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • 178.237.33.50
                                                            Quotation 20241804.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • 178.237.33.50
                                                            SecuriteInfo.com.Win32.RATX-gen.12024.12837.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • 178.237.33.50
                                                            DETAILS.docx.docGet hashmaliciousRemcosBrowse
                                                            • 178.237.33.50
                                                            Carlispa_Ordine_00401702400417.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • 178.237.33.50
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            ColombiaMovilCOxmrhZ7VhlJjD.exeGet hashmaliciousQuasarBrowse
                                                            • 179.13.0.175
                                                            enEQvjUlGl.elfGet hashmaliciousMiraiBrowse
                                                            • 181.207.212.107
                                                            Ns1xkTsDQO.elfGet hashmaliciousMiraiBrowse
                                                            • 181.68.139.5
                                                            7t5zI3LtK8.elfGet hashmaliciousMiraiBrowse
                                                            • 181.207.212.113
                                                            MYb7GhRJl7.elfGet hashmaliciousMiraiBrowse
                                                            • 181.69.231.0
                                                            xBoD1uCJo8Dc.exeGet hashmaliciousXWormBrowse
                                                            • 179.13.0.175
                                                            xffRCvQIkXWb.exeGet hashmaliciousXWormBrowse
                                                            • 179.13.0.175
                                                            tWpGuzQQoW.elfGet hashmaliciousMiraiBrowse
                                                            • 181.205.49.129
                                                            5DkGWDuyYR.elfGet hashmaliciousMiraiBrowse
                                                            • 186.181.146.218
                                                            xmsbkx2F0oQn.exeGet hashmaliciousNjratBrowse
                                                            • 179.13.2.154
                                                            ATOM86-ASATOM86NLRFQ.NO. S70-23Q-1474-CS-P.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                            • 178.237.33.50
                                                            F873635427.vbsGet hashmaliciousRemcos, XWormBrowse
                                                            • 178.237.33.50
                                                            F873635427.vbsGet hashmaliciousRemcos, XWormBrowse
                                                            • 178.237.33.50
                                                            5FU4LRpQdy.rtfGet hashmaliciousRemcosBrowse
                                                            • 178.237.33.50
                                                            awb_shipping_documents_17_04_2024_00000.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • 178.237.33.50
                                                            EFEMACPedido0180040240418.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • 178.237.33.50
                                                            Quotation 20241804.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • 178.237.33.50
                                                            SecuriteInfo.com.Win32.RATX-gen.12024.12837.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                            • 178.237.33.50
                                                            DETAILS.docx.docGet hashmaliciousRemcosBrowse
                                                            • 178.237.33.50
                                                            Carlispa_Ordine_00401702400417.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                            • 178.237.33.50
                                                            No context
                                                            No context
                                                            Process:C:\Users\user\Desktop\tu.exe
                                                            File Type:data
                                                            Category:dropped
                                                            Size (bytes):288
                                                            Entropy (8bit):3.316572720533958
                                                            Encrypted:false
                                                            SSDEEP:6:6l+VGljF65YcIeeDAlOWAAe5q1gWAAe5q1gWAv:6l9RFKec0WFe5BWFe5BW+
                                                            MD5:5EF0EE6432275F6F7514A02C97553C88
                                                            SHA1:8C31C2D60704EF05C9204DC731A83FE6E85E7747
                                                            SHA-256:C266BF987AF7197AD3E1FD1921B4DD0FA9C94FBCCDE11253F0B9A4E6C620776E
                                                            SHA-512:6944C76B8D07D1E3F9C47A86034AFD9709DE5C84D2E24A843999E290F37FAA1F343CB8F481A438551A9DE4008E0BE345A01B186048CF01D83BFC9B1A8AD5026E
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview:....[.2.0.2.4./.0.4./.1.8. .1.8.:.1.6.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                            Process:C:\Users\user\Desktop\tu.exe
                                                            File Type:JSON data
                                                            Category:dropped
                                                            Size (bytes):963
                                                            Entropy (8bit):4.995620093649274
                                                            Encrypted:false
                                                            SSDEEP:12:tklzTknd6CsGkMyGWKyGXPVGArwY3+8aIHrGIArpv/mOAaNO+ao9W7iN5zzkw7Rr:qlkdRNuKyGX855vXhNlT3/77Kdxtro
                                                            MD5:334018F02CE31BCBB4864D602B557FE5
                                                            SHA1:C6DE43E8D6B5C026C0B0A56A898A3F00B282B881
                                                            SHA-256:F70CE925C3923E25A5ADB7089E7EE752E771FBD073888ABFC426138C9094F1B3
                                                            SHA-512:31EF486A2F75226594BC553CBAFA84B645B6ED456F35F363C8EFD6229F4A731981CA1B7736CD4BD739DDCA885F068E96692BB16C7A906314B52220DC63E318BB
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:{. "geoplugin_request":"81.181.57.52",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Marietta",. "geoplugin_region":"Georgia",. "geoplugin_regionCode":"GA",. "geoplugin_regionName":"Georgia",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"524",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"34.0414",. "geoplugin_longitude":"-84.5053",. "geoplugin_locationAccuracyRadius":"1000",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                            Process:C:\Users\user\Desktop\tu.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):800000000
                                                            Entropy (8bit):0.028493769083129367
                                                            Encrypted:false
                                                            SSDEEP:
                                                            MD5:F663BBF108427C54B5CC385802066A8E
                                                            SHA1:E75E867A96F2184C56EA3D4F5D73BCDE6BA8E298
                                                            SHA-256:956E8BA641EB4A1A28F42AEFF877E65B44E111158D07E89302C229028723924D
                                                            SHA-512:9E93BB2A83DA4EEB2BA3CBFF4DDFDD15B0EA21D10CE4DA64C23F22681C0DAB5934B69103512E7695A4D8F3F72FC45D26FAF70C081CCE903A758617E20EFA51AD
                                                            Malicious:true
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K8d..Y...Y...Y.......Y...!...Y...!...Y...!...Y..(.g..Y..(.q..Y...Y...Y...!..]Y.......Y...!...Y..Rich.Y..........PE..L....i3Z............................."............@.......................................@..................................T.......................D.. 1.......,..................................(/..@...............<............................text............................... ..`.rdata..............................@..@.data....`...p...&...R..............@....rsrc................x..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.357495907894201
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            • DOS Executable Generic (2002/1) 0.02%
                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                            File name:tu.exe
                                                            File size:1'340'704 bytes
                                                            MD5:de717951989420c6b9790c9160a23d35
                                                            SHA1:df8621b3d9fa7e4e1d511d6ff732457aac6a0a1d
                                                            SHA256:d434e12726aee7ad7378dc4e395dd5f8fba6255546eef9e1dbb51d52d966af2c
                                                            SHA512:77bdb1c94823c3340082ad5b3ba064cbbd4116758866795053d1b7b0da2f6ba07ad6a94ed8d721aed339a69f5499f0f87406a8dccc64e30aeeb5ef5976c22096
                                                            SSDEEP:24576:ZQHDm64xrB90l7rjM19qIljCh/qIxjySlfa/JY78NLRAgTE//aZ66z24VZbH:J90NM1gqjEBa/S8NLRdTE/iZ66z24VZb
                                                            TLSH:A555AE80F155C8BFD092F5FE079EF1748A69A9F21F63448B3684BF3D1724B84E62065A
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K8d..Y...Y...Y.......Y...!...Y...!...Y...!...Y..(.g..Y..(.q..Y...Y...Y...!..]Y.......Y...!...Y..Rich.Y..........PE..L....i3Z...
                                                            Icon Hash:981ed3d32d2d1f0f
                                                            Entrypoint:0x4322cf
                                                            Entrypoint Section:.text
                                                            Digitally signed:true
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x5A3369A7 [Fri Dec 15 06:20:23 2017 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:5
                                                            OS Version Minor:0
                                                            File Version Major:5
                                                            File Version Minor:0
                                                            Subsystem Version Major:5
                                                            Subsystem Version Minor:0
                                                            Import Hash:770b6801a0e74e55768ad77ae3655811
                                                            Signature Valid:false
                                                            Signature Issuer:CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
                                                            Signature Validation Error:The digital signature of the object did not verify
                                                            Error Number:-2146869232
                                                            Not Before, Not After
                                                            • 09/10/2020 13:32:46 09/10/2021 13:32:46
                                                            Subject Chain
                                                            • CN=JetBrains s.r.o., O=JetBrains s.r.o., L=Praha 4, C=CZ
                                                            Version:3
                                                            Thumbprint MD5:F0ED2CBDD50CA1AE0E013696A39B9894
                                                            Thumbprint SHA-1:B110CE317AC442440C8E3F77675063F9259CF301
                                                            Thumbprint SHA-256:738E3835BABCEAECEE8DF5DED29576EA3797D64B1FE09DAB9606259E0DA473A4
                                                            Serial:045BD7BDE95F9712
                                                            Instruction
                                                            call 00007FD8011E86DEh
                                                            jmp 00007FD8011DB69Eh
                                                            int3
                                                            int3
                                                            int3
                                                            push 0042F840h
                                                            push dword ptr fs:[00000000h]
                                                            mov eax, dword ptr [esp+10h]
                                                            mov dword ptr [esp+10h], ebp
                                                            lea ebp, dword ptr [esp+10h]
                                                            sub esp, eax
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            mov eax, dword ptr [00467BB0h]
                                                            xor dword ptr [ebp-04h], eax
                                                            xor eax, ebp
                                                            push eax
                                                            mov dword ptr [ebp-18h], esp
                                                            push dword ptr [ebp-08h]
                                                            mov eax, dword ptr [ebp-04h]
                                                            mov dword ptr [ebp-04h], FFFFFFFEh
                                                            mov dword ptr [ebp-08h], eax
                                                            lea eax, dword ptr [ebp-10h]
                                                            mov dword ptr fs:[00000000h], eax
                                                            ret
                                                            mov ecx, dword ptr [ebp-10h]
                                                            mov dword ptr fs:[00000000h], ecx
                                                            pop ecx
                                                            pop edi
                                                            pop edi
                                                            pop esi
                                                            pop ebx
                                                            mov esp, ebp
                                                            pop ebp
                                                            push ecx
                                                            ret
                                                            push eax
                                                            push dword ptr fs:[00000000h]
                                                            lea eax, dword ptr [esp+0Ch]
                                                            sub esp, dword ptr [esp+0Ch]
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            mov dword ptr [eax], ebp
                                                            mov ebp, eax
                                                            mov eax, dword ptr [00467BB0h]
                                                            xor eax, ebp
                                                            push eax
                                                            push dword ptr [ebp-04h]
                                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                                            lea eax, dword ptr [ebp-0Ch]
                                                            mov dword ptr fs:[00000000h], eax
                                                            ret
                                                            push eax
                                                            push dword ptr fs:[00000000h]
                                                            lea eax, dword ptr [esp+0Ch]
                                                            sub esp, dword ptr [esp+0Ch]
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            mov dword ptr [eax], ebp
                                                            mov ebp, eax
                                                            mov eax, dword ptr [00467BB0h]
                                                            xor eax, ebp
                                                            push eax
                                                            mov dword ptr [ebp-10h], esp
                                                            push dword ptr [ebp-04h]
                                                            mov dword ptr [ebp-04h], FFFFFFFFh
                                                            lea eax, dword ptr [ebp-0Ch]
                                                            Programming Language:
                                                            • [ASM] VS2008 SP1 build 30729
                                                            • [ C ] VS2008 SP1 build 30729
                                                            • [ C ] VS2005 build 50727
                                                            • [IMP] VS2005 build 50727
                                                            • [C++] VS2008 SP1 build 30729
                                                            • [RES] VS2008 build 21022
                                                            • [LNK] VS2008 SP1 build 30729
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x6540c0xdc.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x6d0000xdcab8.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x1444000x3120.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7b0000x2cb4.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x5c3b00x1c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x62f280x40.rdata
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x5c0000x33c.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x5b0000x5a60002f8cb2bc314ba069296f6fb4ac53a7dFalse0.5254770703665284data6.861631705496741IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x5c0000xb0000xa800b69acd36729a87836d333301d2c8417fFalse0.41010974702380953data5.37465193065485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x670000x60000x2600f11b127fada2b8d9b324acfb25914626False0.31332236842105265data3.767451772833356IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x6d0000xdcab80xdcc0069692bc3ecb06d030ded6377482dc16dFalse0.6232901861551529data7.385118954465469IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_BITMAP0x6d63c0x78c36PC bitmap, Windows 3.x format, 62709 x 2 x 34, image size 494934, cbSize 494646, bits offset 540.7529182486060738
                                                            RT_ICON0xe62740xb39cPC bitmap, Windows 3.x format, 6310 x 2 x 51, image size 46903, cbSize 45980, bits offset 540.48575467594606353
                                                            RT_ICON0xf16100x6553PC bitmap, Windows 3.x format, 4148 x 2 x 41, image size 26215, cbSize 25939, bits offset 540.5584640888237788
                                                            RT_ICON0xf7b640x5a0cPC bitmap, Windows 3.x format, 3626 x 2 x 52, image size 23606, cbSize 23052, bits offset 540.47809300711435015
                                                            RT_ICON0xfd5700x3eb99PC bitmap, Windows 3.x format, 32816 x 2 x 35, image size 257638, cbSize 256921, bits offset 540.5015705216778699
                                                            RT_ICON0x13c10c0x1c9cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9590387766247952
                                                            RT_ICON0x13dda80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.0927609825224374
                                                            RT_ICON0x141fd00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.12935684647302906
                                                            RT_ICON0x1445780x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 0ChineseChina0.15813609467455622
                                                            RT_ICON0x145fe00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.1855065666041276
                                                            RT_ICON0x1470880x988Device independent bitmap graphic, 24 x 48 x 32, image size 0ChineseChina0.24016393442622952
                                                            RT_ICON0x147a100x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 0ChineseChina0.313953488372093
                                                            RT_ICON0x1480c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.1551418439716312
                                                            RT_DIALOG0x1485300x11edataChineseChina0.5699300699300699
                                                            RT_STRING0x1486500x44dataEnglishUnited States0.6617647058823529
                                                            RT_STRING0x1486940x2adataEnglishUnited States0.5476190476190477
                                                            RT_STRING0x1486c00x296dataEnglishUnited States0.3323262839879154
                                                            RT_STRING0x1489580x328dataEnglishUnited States0.34405940594059403
                                                            RT_STRING0x148c800x27cdataEnglishUnited States0.33176100628930816
                                                            RT_STRING0x148efc0x106dataEnglishUnited States0.5763358778625954
                                                            RT_STRING0x1490040xdadataEnglishUnited States0.43119266055045874
                                                            RT_STRING0x1490e00x1f8dataEnglishUnited States0.36706349206349204
                                                            RT_STRING0x1492d80xaedataEnglishUnited States0.5689655172413793
                                                            RT_STRING0x1493880x44dataEnglishUnited States0.6764705882352942
                                                            RT_RCDATA0x1493cc0x80dataEnglishUnited States1.0859375
                                                            RT_GROUP_ICON0x14944c0x76dataChineseChina0.7542372881355932
                                                            RT_VERSION0x1494c40x384dataEnglishUnited States0.4722222222222222
                                                            RT_MANIFEST0x1498480x26eASCII text, with CRLF line terminatorsEnglishUnited States0.5176848874598071
                                                            DLLImport
                                                            KERNEL32.dllLockResource, LoadResource, FindResourceExW, InterlockedIncrement, InterlockedDecrement, lstrlenW, GetLastError, InitializeCriticalSection, MultiByteToWideChar, LoadLibraryExW, lstrcmpiW, Sleep, GetCommandLineW, CloseHandle, DeviceIoControl, CreateFileW, GetCurrentProcessId, CreateProcessW, WriteFile, GetLocalTime, FileTimeToSystemTime, FileTimeToLocalFileTime, GetProcessTimes, SetFilePointer, GetFileSize, GetTickCount, DeleteFileW, CreateThread, WaitForSingleObject, CreateEventW, LocalFree, CreateMutexW, OpenMutexW, SetEnvironmentVariableA, CompareStringW, CompareStringA, GetTimeZoneInformation, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, IsValidLocale, EnumSystemLocalesA, GetUserDefaultLCID, GetDateFormatA, SizeofResource, GetStringTypeW, GetStringTypeA, LCMapStringA, GetLocaleInfoA, GetLocaleInfoW, QueryPerformanceCounter, GetStartupInfoA, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, FlushFileBuffers, GetConsoleMode, GetConsoleCP, WideCharToMultiByte, InitializeCriticalSectionAndSpinCount, InterlockedExchange, SetConsoleCtrlHandler, GetModuleHandleA, FindResourceW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, GetModuleHandleW, LoadLibraryW, GetCurrentProcess, FlushInstructionCache, DeleteCriticalSection, RaiseException, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetModuleFileNameA, GetStdHandle, GetCurrentThread, FatalAppExitA, HeapCreate, GetStartupInfoW, ExitProcess, FreeLibrary, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, RtlUnwind, ExitThread, TlsFree, DeleteAtom, FindAtomW, TlsAlloc, ReleaseMutex, AddAtomW, GetCurrentThreadId, SetLastError, OpenThread, GetAtomNameW, TlsSetValue, GetProcAddress, GetTimeFormatA, InterlockedCompareExchange, HeapFree, GetProcessHeap, HeapAlloc, LoadLibraryA, IsProcessorFeaturePresent, VirtualFree, VirtualAlloc, HeapDestroy, HeapReAlloc, HeapSize, CreateFileA, SystemTimeToFileTime, GetSystemTimeAsFileTime, LocalFileTimeToFileTime, SetEndOfFile, SetFilePointerEx, ReadFile, GetFileSizeEx, OutputDebugStringW, FormatMessageW, GetSystemTime, TlsGetValue
                                                            USER32.dllTranslateMessage, GetMessageW, DefWindowProcW, UnregisterClassA, CreateDialogParamW, DispatchMessageW, SetWindowLongW, DestroyWindow, SendMessageTimeoutW, FindWindowW, GetActiveWindow, MessageBoxW, RegisterClassW, GetWindowThreadProcessId, GetParent, GetWindow, GetWindowRect, GetWindowLongW, MonitorFromWindow, GetMonitorInfoW, GetClientRect, MapWindowPoints, SetWindowPos, IsDialogMessageW, SendMessageW, PostQuitMessage, GetSystemMetrics, LoadImageW, IsWindow, PostMessageW, CharNextW, GetClassInfoW, PeekMessageW
                                                            ADVAPI32.dllRegQueryValueExA, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegQueryValueExW, RegQueryInfoKeyW, RegSetValueExW, RegEnumKeyExW, RegOpenKeyExW, RegDeleteKeyW
                                                            SHELL32.dllShellExecuteExW, SHCreateDirectoryExW, ShellExecuteW, CommandLineToArgvW, SHGetSpecialFolderPathW
                                                            ole32.dllCoInitialize, CoCreateInstance, CoTaskMemFree, CoTaskMemAlloc, CoTaskMemRealloc, CoUninitialize
                                                            OLEAUT32.dllVarUI4FromStr, SysFreeString
                                                            SHLWAPI.dllPathRemoveFileSpecW, PathAppendW, PathFindFileNameW, PathFileExistsW, PathRemoveExtensionW, SHGetValueW, PathCombineW
                                                            COMCTL32.dllInitCommonControlsEx
                                                            WINTRUST.dllWinVerifyTrust, WTHelperProvDataFromStateData
                                                            CRYPT32.dllCertGetNameStringW
                                                            Language of compilation systemCountry where language is spokenMap
                                                            ChineseChina
                                                            EnglishUnited States
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Apr 18, 2024 18:16:14.517302990 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:14.676237106 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:14.676347017 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:14.682004929 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:14.850346088 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:14.891710043 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:15.052470922 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:15.056845903 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:15.254281998 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:15.254390001 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:15.420167923 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:15.433981895 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:15.596349955 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:15.657367945 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:15.768258095 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:16:15.974117041 CEST8049722178.237.33.50192.168.2.6
                                                            Apr 18, 2024 18:16:15.974262953 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:16:15.974826097 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:16:16.184247017 CEST8049722178.237.33.50192.168.2.6
                                                            Apr 18, 2024 18:16:16.184367895 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:16:16.238990068 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:16.449656963 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:17.184345961 CEST8049722178.237.33.50192.168.2.6
                                                            Apr 18, 2024 18:16:17.184510946 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:16:30.640636921 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:16:30.708592892 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:31.016771078 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:31.329293966 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:16:31.486228943 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:17:00.590404034 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:17:00.611850023 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:17:00.856513023 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:17:00.856625080 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:17:01.860750914 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:17:02.014426947 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:17:30.170579910 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:17:30.172158003 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:17:34.021656990 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:17:34.198468924 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:18:05.436821938 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:18:05.438321114 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:18:05.626756907 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:06.173321009 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:07.360744953 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:09.563836098 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:13.876401901 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:16.673240900 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:18:16.830579996 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:18:22.128321886 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:38.673280954 CEST4972280192.168.2.6178.237.33.50
                                                            Apr 18, 2024 18:18:41.074959040 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:18:41.076925993 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:18:41.447072983 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:19:10.998938084 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:19:11.000452042 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:19:11.564078093 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:19:12.173347950 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:19:12.338812113 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:19:41.041225910 CEST777049721179.14.10.110192.168.2.6
                                                            Apr 18, 2024 18:19:41.043339014 CEST497217770192.168.2.6179.14.10.110
                                                            Apr 18, 2024 18:19:41.432884932 CEST777049721179.14.10.110192.168.2.6
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Apr 18, 2024 18:16:12.672779083 CEST5081753192.168.2.61.1.1.1
                                                            Apr 18, 2024 18:16:13.699551105 CEST5081753192.168.2.61.1.1.1
                                                            Apr 18, 2024 18:16:14.512845039 CEST53508171.1.1.1192.168.2.6
                                                            Apr 18, 2024 18:16:14.512897015 CEST53508171.1.1.1192.168.2.6
                                                            Apr 18, 2024 18:16:15.646572113 CEST6364053192.168.2.61.1.1.1
                                                            Apr 18, 2024 18:16:15.751774073 CEST53636401.1.1.1192.168.2.6
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Apr 18, 2024 18:16:12.672779083 CEST192.168.2.61.1.1.10x2f23Standard query (0)abril18.con-ip.comA (IP address)IN (0x0001)false
                                                            Apr 18, 2024 18:16:13.699551105 CEST192.168.2.61.1.1.10x2f23Standard query (0)abril18.con-ip.comA (IP address)IN (0x0001)false
                                                            Apr 18, 2024 18:16:15.646572113 CEST192.168.2.61.1.1.10x6976Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Apr 18, 2024 18:16:14.512845039 CEST1.1.1.1192.168.2.60x2f23No error (0)abril18.con-ip.com179.14.10.110A (IP address)IN (0x0001)false
                                                            Apr 18, 2024 18:16:14.512897015 CEST1.1.1.1192.168.2.60x2f23No error (0)abril18.con-ip.com179.14.10.110A (IP address)IN (0x0001)false
                                                            Apr 18, 2024 18:16:15.751774073 CEST1.1.1.1192.168.2.60x6976No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                            • geoplugin.net
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.649722178.237.33.50804256C:\Users\user\Desktop\tu.exe
                                                            TimestampBytes transferredDirectionData
                                                            Apr 18, 2024 18:16:15.974826097 CEST71OUTGET /json.gp HTTP/1.1
                                                            Host: geoplugin.net
                                                            Cache-Control: no-cache
                                                            Apr 18, 2024 18:16:16.184247017 CEST1171INHTTP/1.1 200 OK
                                                            date: Thu, 18 Apr 2024 16:16:16 GMT
                                                            server: Apache
                                                            content-length: 963
                                                            content-type: application/json; charset=utf-8
                                                            cache-control: public, max-age=300
                                                            access-control-allow-origin: *
                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 31 2e 31 38 31 2e 35 37 2e 35 32 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4d 61 72 69 65 74 74 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 47 65 6f 72 67 69 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 47 41 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 47 65 6f 72 67 69 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 35 32 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 33 34 2e 30 34 31 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 2d 38 34 2e 35 30 35 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 31 30 30 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 5c 2f 4e 65 77 5f 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 24 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 24 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 0a 7d
                                                            Data Ascii: { "geoplugin_request":"81.181.57.52", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Marietta", "geoplugin_region":"Georgia", "geoplugin_regionCode":"GA", "geoplugin_regionName":"Georgia", "geoplugin_areaCode":"", "geoplugin_dmaCode":"524", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"34.0414", "geoplugin_longitude":"-84.5053", "geoplugin_locationAccuracyRadius":"1000", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:18:15:50
                                                            Start date:18/04/2024
                                                            Path:C:\Users\user\Desktop\tu.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\tu.exe"
                                                            Imagebase:0x400000
                                                            File size:1'340'704 bytes
                                                            MD5 hash:DE717951989420C6B9790C9160A23D35
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000000.00000002.2312383300.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmp, Author: unknown
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:18:16:11
                                                            Start date:18/04/2024
                                                            Path:C:\Users\user\Desktop\tu.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\tu.exe"
                                                            Imagebase:0x400000
                                                            File size:1'340'704 bytes
                                                            MD5 hash:DE717951989420C6B9790C9160A23D35
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.4579308792.0000000000937000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.4585822426.00000000024CF000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.4579253118.00000000008F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                            • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:0.3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:24%
                                                              Total number of Nodes:25
                                                              Total number of Limit Nodes:0
                                                              execution_graph 29982 4115e1 29983 4115eb NtQueryDefaultLocale 29982->29983 29985 423416 29983->29985 29986 413353 29988 4131aa 29986->29988 29987 41340b VirtualProtect 29989 41343c 29987->29989 29988->29987 29990 42a884 29993 42a8b1 29990->29993 29996 42a8e8 VirtualProtect 29993->29996 29997 42a8f9 29993->29997 29995 42ac24 29995->29995 29996->29995 29997->29996 29999 42ab62 29997->29999 30002 42ab81 29999->30002 30003 42abac VirtualProtect 30002->30003 30005 42ac24 30003->30005 30005->30005 30006 42b8b9 30007 42b8d5 30006->30007 30008 42c034 ExitProcess 30007->30008 30009 42979c 30012 4297b7 30009->30012 30013 4297c5 30012->30013 30018 429826 12 API calls 30013->30018 30015 42981c 30019 42985b 12 API calls 30015->30019 30018->30015

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 411f13-411f1e 1 411f20-411f27 0->1 2 411f29-411f67 call 411f3b call 411f57 0->2 1->2 3 411f6f-4123f4 1->3 2->3 14 412cf2-41307f call 412d0d call 413065 3->14 15 4123fa-412581 call 4124af 3->15 21 412583-41258d 15->21 22 412592-4125dd 15->22 23 412839-412872 21->23 24 4125df-4125e9 22->24 25 4125ee-412652 22->25 27 4128b5-412913 23->27 28 412874-4128b0 23->28 24->23 33 412656-412717 25->33 34 412915-412921 27->34 35 412926-41293b 27->35 38 4133dd-41343a call 41340b VirtualProtect 28->38 51 412719-41272c 33->51 52 41272e-41273b 33->52 41 412c17-412c1e 34->41 36 41293d-412949 35->36 37 41294e-41296d 35->37 36->41 42 412980-412992 37->42 43 41296f-41297b 37->43 63 413482-4134ca call 4134cb 38->63 64 41343c-41347a 38->64 41->14 47 412c24-412caf 41->47 48 4129a5-412a0e 42->48 49 412994-4129a0 42->49 43->41 47->14 74 412cb1-412ced 47->74 61 412a14-412a5e 48->61 62 412c0b-412c11 48->62 49->41 56 412788-41278f 51->56 52->33 57 412741-412751 52->57 59 4127d1-4127e8 call 4127ed 56->59 60 412791-4127cf 56->60 57->33 65 412757-412764 57->65 59->23 60->23 68 412a6f-412a80 61->68 62->41 64->63 70 412772 65->70 71 412766-412770 65->71 76 412b21-412b72 call 412b40 68->76 77 412a86-412a96 68->77 73 41277c-412782 70->73 71->73 73->56 74->38 93 412b80-412bd7 76->93 94 412b74-412b7e 76->94 77->76 81 412a9c-412aed 77->81 90 412b13 81->90 91 412aef-412b11 81->91 90->68 91->90 95 412b1a 91->95 100 412be5 93->100 101 412bd9-412be3 93->101 96 412bef-412bf6 94->96 95->76 98 412c06 96->98 99 412bf8-412c04 96->99 98->41 99->41 100->96 101->96
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$P$V$W$a$a$a$b$c$d$e$i$i$l$o$o$r$r$r$r$t$t$t$u$y
                                                              • API String ID: 0-2457314740
                                                              • Opcode ID: 6c0678d71f59eaad0a271e74b48422590de4efa6e96bb9f7b1230fa3b77f91a8
                                                              • Instruction ID: 476cd1d49638d903c036dba307a3613fa274d41bc6001e90f77476314b7ab0cf
                                                              • Opcode Fuzzy Hash: 6c0678d71f59eaad0a271e74b48422590de4efa6e96bb9f7b1230fa3b77f91a8
                                                              • Instruction Fuzzy Hash: 09C126B1D092A89AF7218724DC18BEB7A75EF91304F0840FAD44D67282D6BD1FC5CB66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 102 4124af-412581 103 412583-41258d 102->103 104 412592-4125dd 102->104 105 412839-412872 103->105 106 4125df-4125e9 104->106 107 4125ee-412652 104->107 108 4128b5-412913 105->108 109 412874-4128b0 105->109 106->105 112 412656-412717 107->112 113 412915-412921 108->113 114 412926-41293b 108->114 117 4133dd-41343a call 41340b VirtualProtect 109->117 130 412719-41272c 112->130 131 41272e-41273b 112->131 119 412c17-412c1e 113->119 115 41293d-412949 114->115 116 41294e-41296d 114->116 115->119 120 412980-412992 116->120 121 41296f-41297b 116->121 144 413482-4134ca call 4134cb 117->144 145 41343c-41347a 117->145 124 412cf2-41307f call 412d0d call 413065 119->124 125 412c24-412caf 119->125 127 4129a5-412a0e 120->127 128 412994-4129a0 120->128 121->119 125->124 156 412cb1-412ced 125->156 142 412a14-412a5e 127->142 143 412c0b-412c11 127->143 128->119 136 412788-41278f 130->136 131->112 137 412741-412751 131->137 139 4127d1-4127e8 call 4127ed 136->139 140 412791-4127cf 136->140 137->112 146 412757-412764 137->146 139->105 140->105 150 412a6f-412a80 142->150 143->119 145->144 152 412772 146->152 153 412766-412770 146->153 159 412b21-412b72 call 412b40 150->159 160 412a86-412a96 150->160 155 41277c-412782 152->155 153->155 155->136 156->117 179 412b80-412bd7 159->179 180 412b74-412b7e 159->180 160->159 165 412a9c-412aed 160->165 176 412b13 165->176 177 412aef-412b11 165->177 176->150 177->176 181 412b1a 177->181 186 412be5 179->186 187 412bd9-412be3 179->187 182 412bef-412bf6 180->182 181->159 184 412c06 182->184 185 412bf8-412c04 182->185 184->119 185->119 186->182 187->182
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: BE64$L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 544645111-1563255461
                                                              • Opcode ID: 50741aaa02ecff7c3c56a48cacdf7b6a643d3d92b9f739f18f153e3e4c9a4a8e
                                                              • Instruction ID: f4fbf254b82033adbc7d050db839c67a24bd70f736eeffb30d7f5bb2df1b0a09
                                                              • Opcode Fuzzy Hash: 50741aaa02ecff7c3c56a48cacdf7b6a643d3d92b9f739f18f153e3e4c9a4a8e
                                                              • Instruction Fuzzy Hash: 0CB104B1D041689AFB248B14DC44BFB76B5EB94300F1481FAD94D66280DABC5EC5CF56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 188 41236c-41239f 189 4123b1-4123f4 188->189 190 4123a1-4123ab 188->190 193 412cf2-41307f call 412d0d call 413065 189->193 194 4123fa-412581 call 4124af 189->194 190->189 191 41217c-412340 call 4121aa call 412341 190->191 204 412583-41258d 194->204 205 412592-4125dd 194->205 206 412839-412872 204->206 207 4125df-4125e9 205->207 208 4125ee-412652 205->208 211 4128b5-412913 206->211 212 412874-4128b0 206->212 207->206 218 412656-412717 208->218 219 412915-412921 211->219 220 412926-41293b 211->220 224 4133dd-41343a call 41340b VirtualProtect 212->224 240 412719-41272c 218->240 241 41272e-41273b 218->241 227 412c17-412c1e 219->227 222 41293d-412949 220->222 223 41294e-41296d 220->223 222->227 230 412980-412992 223->230 231 41296f-41297b 223->231 252 413482-4134ca call 4134cb 224->252 253 41343c-41347a 224->253 227->193 235 412c24-412caf 227->235 237 4129a5-412a0e 230->237 238 412994-4129a0 230->238 231->227 235->193 263 412cb1-412ced 235->263 250 412a14-412a5e 237->250 251 412c0b-412c11 237->251 238->227 245 412788-41278f 240->245 241->218 246 412741-412751 241->246 248 4127d1-4127e8 call 4127ed 245->248 249 412791-4127cf 245->249 246->218 254 412757-412764 246->254 248->206 249->206 257 412a6f-412a80 250->257 251->227 253->252 259 412772 254->259 260 412766-412770 254->260 265 412b21-412b72 call 412b40 257->265 266 412a86-412a96 257->266 262 41277c-412782 259->262 260->262 262->245 263->224 282 412b80-412bd7 265->282 283 412b74-412b7e 265->283 266->265 270 412a9c-412aed 266->270 279 412b13 270->279 280 412aef-412b11 270->280 279->257 280->279 284 412b1a 280->284 289 412be5 282->289 290 412bd9-412be3 282->290 285 412bef-412bf6 283->285 284->265 287 412c06 285->287 288 412bf8-412c04 285->288 287->227 288->227 289->285 290->285
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 544645111-4069139063
                                                              • Opcode ID: 1697c17536c43d5224c5223728f30617d934cc08339edc8ab25258b41023f051
                                                              • Instruction ID: 0e164774676a89a4ddaeb1eb2540a4a1a124e66d4721b90c21cbc7c83e26099d
                                                              • Opcode Fuzzy Hash: 1697c17536c43d5224c5223728f30617d934cc08339edc8ab25258b41023f051
                                                              • Instruction Fuzzy Hash: 60C1F2B1D082689AF7248B24DC44BEA7B75EF51310F0441FAD94DA7280E6BD1FC58FA6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 291 429b6a-429b8e 292 429ba0 291->292 293 429b90-429b9a 291->293 295 429baa-429be3 292->295 293->292 294 429956-429a52 call 4299e3 call 429a53 293->294 294->295 297 42a4f6-42a504 call 42a505 295->297 298 429be9-429d70 295->298 300 429d72-429d7c 298->300 301 429d81-429dcc call 429db2 298->301 304 42a03d-42a076 300->304 313 429dce-429dd8 301->313 314 429ddd-429e02 call 429e03 301->314 311 42a078-42ac1e VirtualProtect 304->311 312 42a0b9-42a117 304->312 323 42ac24 311->323 317 42a12a-42a13f 312->317 318 42a119-42a125 312->318 313->304 314->304 321 42a152-42a171 317->321 322 42a141-42a14d 317->322 320 42a41b-42a422 318->320 320->297 327 42a428-42a43c call 42a43f 320->327 324 42a173-42a17f 321->324 325 42a184-42a196 321->325 322->320 323->323 324->320 328 42a198-42a1a4 325->328 329 42a1a9-42a212 325->329 328->320 333 42a218-42a262 329->333 334 42a40f-42a415 329->334 335 42a273-42a284 333->335 334->320 336 42a325-42a376 335->336 337 42a28a-42a29a 335->337 340 42a384-42a396 call 42a397 336->340 341 42a378-42a382 336->341 337->336 339 42a2a0-42a2f1 337->339 345 42a2f3-42a315 339->345 346 42a317 339->346 343 42a3f3-42a3fa 340->343 341->343 348 42a40a 343->348 349 42a3fc-42a408 343->349 345->346 350 42a31e 345->350 346->335 348->320 349->320 350->336
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 544645111-4069139063
                                                              • Opcode ID: 374fee517d217205c8d990f860241aaa94610111203e1a1e46cff437b155baa5
                                                              • Instruction ID: 2c10b90d936b34e74c743eeedad6fdb06111070cc7f1826e7be6a01e813448cf
                                                              • Opcode Fuzzy Hash: 374fee517d217205c8d990f860241aaa94610111203e1a1e46cff437b155baa5
                                                              • Instruction Fuzzy Hash: 2EC1C0B2D052689AE7208B24DC44BEBBB75EF95310F0480FAD80DA7781D6795EC1CF66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 352 429a53-429a7c 353 429a96-429aa6 352->353 354 429a7e-429a94 352->354 356 4299b5-429a52 call 4299e3 call 429a53 353->356 357 429aac-429abf 353->357 355 429af9-429b00 354->355 358 429b42-429b69 call 429b6a 355->358 359 429b02-429b40 355->359 371 429baa-429be3 356->371 357->356 361 429ac5-429ad5 357->361 358->371 359->371 365 429ae3 361->365 366 429ad7-429ae1 361->366 370 429aed-429af3 365->370 366->370 370->355 373 42a4f6-42a504 call 42a505 371->373 374 429be9-429d70 371->374 375 429d72-429d7c 374->375 376 429d81-429dcc call 429db2 374->376 378 42a03d-42a076 375->378 385 429dce-429dd8 376->385 386 429ddd-429e02 call 429e03 376->386 383 42a078-42ac1e VirtualProtect 378->383 384 42a0b9-42a117 378->384 395 42ac24 383->395 389 42a12a-42a13f 384->389 390 42a119-42a125 384->390 385->378 386->378 393 42a152-42a171 389->393 394 42a141-42a14d 389->394 392 42a41b-42a422 390->392 392->373 399 42a428-42a43c call 42a43f 392->399 396 42a173-42a17f 393->396 397 42a184-42a196 393->397 394->392 395->395 396->392 400 42a198-42a1a4 397->400 401 42a1a9-42a212 397->401 400->392 405 42a218-42a262 401->405 406 42a40f-42a415 401->406 407 42a273-42a284 405->407 406->392 408 42a325-42a376 407->408 409 42a28a-42a29a 407->409 412 42a384-42a396 call 42a397 408->412 413 42a378-42a382 408->413 409->408 411 42a2a0-42a2f1 409->411 417 42a2f3-42a315 411->417 418 42a317 411->418 415 42a3f3-42a3fa 412->415 413->415 420 42a40a 415->420 421 42a3fc-42a408 415->421 417->418 422 42a31e 417->422 418->407 420->392 421->392 422->408
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: 3d10536fc2cfb9d5a69a6ef29ffa2cff4206653b90564503b16debf27cde5b0f
                                                              • Instruction ID: d3511023427c8a32ec9ab0730e7ac4da0a0acbff21bb0c7547ffc5994e4b7d30
                                                              • Opcode Fuzzy Hash: 3d10536fc2cfb9d5a69a6ef29ffa2cff4206653b90564503b16debf27cde5b0f
                                                              • Instruction Fuzzy Hash: 72A1F2A2D056798AE7208B14EC44BEBBA75EF95310F0440FAD80D67781E67D0EC1CF66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 517 42991a-429939 518 42994a-429a52 call 4299e3 call 429a53 517->518 519 42993b-429945 517->519 521 429baa-429be3 518->521 519->521 523 42a4f6-42a504 call 42a505 521->523 524 429be9-429d70 521->524 526 429d72-429d7c 524->526 527 429d81-429dcc call 429db2 524->527 530 42a03d-42a076 526->530 539 429dce-429dd8 527->539 540 429ddd-429e02 call 429e03 527->540 537 42a078-42ac1e VirtualProtect 530->537 538 42a0b9-42a117 530->538 549 42ac24 537->549 543 42a12a-42a13f 538->543 544 42a119-42a125 538->544 539->530 540->530 547 42a152-42a171 543->547 548 42a141-42a14d 543->548 546 42a41b-42a422 544->546 546->523 553 42a428-42a43c call 42a43f 546->553 550 42a173-42a17f 547->550 551 42a184-42a196 547->551 548->546 549->549 550->546 554 42a198-42a1a4 551->554 555 42a1a9-42a212 551->555 554->546 559 42a218-42a262 555->559 560 42a40f-42a415 555->560 561 42a273-42a284 559->561 560->546 562 42a325-42a376 561->562 563 42a28a-42a29a 561->563 566 42a384-42a396 call 42a397 562->566 567 42a378-42a382 562->567 563->562 565 42a2a0-42a2f1 563->565 571 42a2f3-42a315 565->571 572 42a317 565->572 569 42a3f3-42a3fa 566->569 567->569 574 42a40a 569->574 575 42a3fc-42a408 569->575 571->572 576 42a31e 571->576 572->561 574->546 575->546 576->562
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 544645111-4069139063
                                                              • Opcode ID: 294abf85f3a1608ba1af9e138d5bc7c76b94f74e8d3669d7b637d0ffdee31014
                                                              • Instruction ID: 9e3484ae8f37d004cd89b3611b91c015ebaaa81bb66835bc5d0b3cd39ed96991
                                                              • Opcode Fuzzy Hash: 294abf85f3a1608ba1af9e138d5bc7c76b94f74e8d3669d7b637d0ffdee31014
                                                              • Instruction Fuzzy Hash: 5991D1A2D152689AF7208B24DC44BEBBA75EF95310F0480FAD90D67781E6790EC1CF66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1070 412583-412872 1072 4128b5-412913 1070->1072 1073 412874-4128b0 1070->1073 1075 412915-412921 1072->1075 1076 412926-41293b 1072->1076 1079 4133dd-41343a call 41340b VirtualProtect 1073->1079 1080 412c17-412c1e 1075->1080 1077 41293d-412949 1076->1077 1078 41294e-41296d 1076->1078 1077->1080 1081 412980-412992 1078->1081 1082 41296f-41297b 1078->1082 1098 413482-4134ca call 4134cb 1079->1098 1099 41343c-41347a 1079->1099 1084 412cf2-41307f call 412d0d call 413065 1080->1084 1085 412c24-412caf 1080->1085 1087 4129a5-412a0e 1081->1087 1088 412994-4129a0 1081->1088 1082->1080 1085->1084 1104 412cb1-412ced 1085->1104 1096 412a14-412a5e 1087->1096 1097 412c0b-412c11 1087->1097 1088->1080 1101 412a6f-412a80 1096->1101 1097->1080 1099->1098 1106 412b21-412b72 call 412b40 1101->1106 1107 412a86-412a96 1101->1107 1104->1079 1125 412b80-412bd7 1106->1125 1126 412b74-412b7e 1106->1126 1107->1106 1111 412a9c-412aed 1107->1111 1122 412b13 1111->1122 1123 412aef-412b11 1111->1123 1122->1101 1123->1122 1127 412b1a 1123->1127 1132 412be5 1125->1132 1133 412bd9-412be3 1125->1133 1128 412bef-412bf6 1126->1128 1127->1106 1130 412c06 1128->1130 1131 412bf8-412c04 1128->1131 1130->1080 1131->1080 1132->1128 1133->1128
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: FMKH
                                                              • API String ID: 544645111-2364774658
                                                              • Opcode ID: eefdafdcaa40b702c5e12c677b62e72d973b80019278f60722d66e384fa445f5
                                                              • Instruction ID: d3cd8285267a7954bd6ab46f5573bb8169a7e04926abf037f45bf2c87426fc3a
                                                              • Opcode Fuzzy Hash: eefdafdcaa40b702c5e12c677b62e72d973b80019278f60722d66e384fa445f5
                                                              • Instruction Fuzzy Hash: 60E1AEB1E091288FEB24CE14DD94BEA77B5EF85300F1481FAD84DA7640D6786EC2CE56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1134 42b525-42b555 1135 42b557-42b563 1134->1135 1136 42b568-42b57d 1134->1136 1137 42b859-42b860 1135->1137 1138 42b590-42b5af 1136->1138 1139 42b57f-42b58b 1136->1139 1140 42b866-42b8b8 call 42b8b9 1137->1140 1141 42b934-42c036 call 42bcf5 ExitProcess 1137->1141 1142 42b5c2-42b5d4 1138->1142 1143 42b5b1-42b5bd 1138->1143 1139->1137 1146 42b5d6-42b5e2 1142->1146 1147 42b5e7-42b650 1142->1147 1143->1137 1146->1137 1152 42b656-42b6c2 1147->1152 1153 42b84d-42b853 1147->1153 1156 42b763-42b7b4 1152->1156 1157 42b6c8-42b6d8 1152->1157 1153->1137 1163 42b7c2-42b7ed call 42b7d5 call 42b7f0 1156->1163 1164 42b7b6-42b7c0 1156->1164 1157->1156 1159 42b6de-42b6f3 call 42b6f5 1157->1159 1159->1156 1167 42b831-42b838 1163->1167 1164->1167 1172 42b83a-42b846 1167->1172 1173 42b848 1167->1173 1172->1137 1173->1137
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID: 0-399585960
                                                              • Opcode ID: 817dee6a02d4a00ca1df7e87ff7d872a07f8a67fff4a99fb298c32b46e9382e5
                                                              • Instruction ID: 31a9b62b41435ce74390fe9ef6e94a1f09138d69e291401c5a2d32638974bef9
                                                              • Opcode Fuzzy Hash: 817dee6a02d4a00ca1df7e87ff7d872a07f8a67fff4a99fb298c32b46e9382e5
                                                              • Instruction Fuzzy Hash: 9FB158B4E052289FEB24CF14DD90BAAB775FB84304F1041EED94AA6381D7795EC18F85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 517b7d28ef2f18e0c4725bf27557bc005b38673eb6e57fb953eb8e388ceb4d6d
                                                              • Instruction ID: d900476614f8f23cc9e879a45790bf3c1646bd389133799c5f08f5fe28d27fe2
                                                              • Opcode Fuzzy Hash: 517b7d28ef2f18e0c4725bf27557bc005b38673eb6e57fb953eb8e388ceb4d6d
                                                              • Instruction Fuzzy Hash: D7E18C71E042298FEB64CB18DC94BEAB7B5EF84304F1441EAD90EA7640DA395ED1CE46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • NtQueryDefaultLocale.NTDLL(00000000,FFFFDD34), ref: 00423408
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DefaultLocaleQuery
                                                              • String ID:
                                                              • API String ID: 2949231068-0
                                                              • Opcode ID: b2ee84f09b885da0426a8b4cc7524a39cc0367720e40ed1b25acb2ad259b4017
                                                              • Instruction ID: 6ff46d42b6d1ddb3ebe1fef3186f4aff8f33b86988ed82ba4cc1de00f3c12425
                                                              • Opcode Fuzzy Hash: b2ee84f09b885da0426a8b4cc7524a39cc0367720e40ed1b25acb2ad259b4017
                                                              • Instruction Fuzzy Hash: 4BA1E3B1E041289BEB24CF15DC84AEAB775EB85311F5085FAD80DA6680D63C5FC2CF56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: ab21e6513cc5465660577a6e3733835d22f226260581db0f74d7e79805a448c6
                                                              • Instruction ID: 4c4cc9cac45f9ecb23ebe1cd26d239c18ac3ca12bdb20e5b32276d34eedd350a
                                                              • Opcode Fuzzy Hash: ab21e6513cc5465660577a6e3733835d22f226260581db0f74d7e79805a448c6
                                                              • Instruction Fuzzy Hash: 7071C3B2E041289BFB248B14EC54BFB7775EB94310F1481FAD90DA6280EA7C5EC58E55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ExitProcess.KERNEL32(00000000), ref: 0042C036
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID:
                                                              • API String ID: 621844428-0
                                                              • Opcode ID: 89d339f187005aac8e4a0435b57b22154c31d0194251427fb786b4e4ddd2d639
                                                              • Instruction ID: 5a8c98eeb4abc26c21ad2a6fd394327375fe50257aa8bb3f840f3a48dce10db2
                                                              • Opcode Fuzzy Hash: 89d339f187005aac8e4a0435b57b22154c31d0194251427fb786b4e4ddd2d639
                                                              • Instruction Fuzzy Hash: E041B5F2D05224AFF7248A10EC55BFB7779EB84310F1041BED90EA6780D67C5EC18A92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 424 41209c-4123f4 429 412cf2-41307f call 412d0d call 413065 424->429 430 4123fa-412581 call 4124af 424->430 436 412583-41258d 430->436 437 412592-4125dd 430->437 438 412839-412872 436->438 439 4125df-4125e9 437->439 440 4125ee-412652 437->440 442 4128b5-412913 438->442 443 412874-4128b0 438->443 439->438 448 412656-412717 440->448 449 412915-412921 442->449 450 412926-41293b 442->450 453 4133dd-41343a call 41340b VirtualProtect 443->453 466 412719-41272c 448->466 467 41272e-41273b 448->467 456 412c17-412c1e 449->456 451 41293d-412949 450->451 452 41294e-41296d 450->452 451->456 457 412980-412992 452->457 458 41296f-41297b 452->458 478 413482-4134ca call 4134cb 453->478 479 41343c-41347a 453->479 456->429 462 412c24-412caf 456->462 463 4129a5-412a0e 457->463 464 412994-4129a0 457->464 458->456 462->429 489 412cb1-412ced 462->489 476 412a14-412a5e 463->476 477 412c0b-412c11 463->477 464->456 471 412788-41278f 466->471 467->448 472 412741-412751 467->472 474 4127d1-4127e8 call 4127ed 471->474 475 412791-4127cf 471->475 472->448 480 412757-412764 472->480 474->438 475->438 483 412a6f-412a80 476->483 477->456 479->478 485 412772 480->485 486 412766-412770 480->486 491 412b21-412b72 call 412b40 483->491 492 412a86-412a96 483->492 488 41277c-412782 485->488 486->488 488->471 489->453 508 412b80-412bd7 491->508 509 412b74-412b7e 491->509 492->491 496 412a9c-412aed 492->496 505 412b13 496->505 506 412aef-412b11 496->506 505->483 506->505 510 412b1a 506->510 515 412be5 508->515 516 412bd9-412be3 508->516 511 412bef-412bf6 509->511 510->491 513 412c06 511->513 514 412bf8-412c04 511->514 513->456 514->456 515->511 516->511
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: 6a3695ecda41a5ce4dd8bfd705eed27bbfa2a34ed51108a9cfdce50e9d1f31e6
                                                              • Instruction ID: 07e33d738da2e98f83c88bc94ad3fbb7c44ff3308f48e624c88b62337664ae6b
                                                              • Opcode Fuzzy Hash: 6a3695ecda41a5ce4dd8bfd705eed27bbfa2a34ed51108a9cfdce50e9d1f31e6
                                                              • Instruction Fuzzy Hash: 269124B1D082688AF7248B24DC19BFA7A75EF51300F0840FED84D97281DABD5FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 578 41213b-4123f4 582 412cf2-41307f call 412d0d call 413065 578->582 583 4123fa-412581 call 4124af 578->583 589 412583-41258d 583->589 590 412592-4125dd 583->590 591 412839-412872 589->591 592 4125df-4125e9 590->592 593 4125ee-412652 590->593 595 4128b5-412913 591->595 596 412874-4128b0 591->596 592->591 601 412656-412717 593->601 602 412915-412921 595->602 603 412926-41293b 595->603 606 4133dd-41343a call 41340b VirtualProtect 596->606 619 412719-41272c 601->619 620 41272e-41273b 601->620 609 412c17-412c1e 602->609 604 41293d-412949 603->604 605 41294e-41296d 603->605 604->609 610 412980-412992 605->610 611 41296f-41297b 605->611 631 413482-4134ca call 4134cb 606->631 632 41343c-41347a 606->632 609->582 615 412c24-412caf 609->615 616 4129a5-412a0e 610->616 617 412994-4129a0 610->617 611->609 615->582 642 412cb1-412ced 615->642 629 412a14-412a5e 616->629 630 412c0b-412c11 616->630 617->609 624 412788-41278f 619->624 620->601 625 412741-412751 620->625 627 4127d1-4127e8 call 4127ed 624->627 628 412791-4127cf 624->628 625->601 633 412757-412764 625->633 627->591 628->591 636 412a6f-412a80 629->636 630->609 632->631 638 412772 633->638 639 412766-412770 633->639 644 412b21-412b72 call 412b40 636->644 645 412a86-412a96 636->645 641 41277c-412782 638->641 639->641 641->624 642->606 661 412b80-412bd7 644->661 662 412b74-412b7e 644->662 645->644 649 412a9c-412aed 645->649 658 412b13 649->658 659 412aef-412b11 649->659 658->636 659->658 663 412b1a 659->663 668 412be5 661->668 669 412bd9-412be3 661->669 664 412bef-412bf6 662->664 663->644 666 412c06 664->666 667 412bf8-412c04 664->667 666->609 667->609 668->664 669->664
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: fc4e61dde0ff008e1d8a73e250225d59bce6c42b06b9f0136b307f8bf316a4bf
                                                              • Instruction ID: d0d281f45b71ee8c2d02bb3531afe43231dd45ba6bb09fd8b5ea2ee9047042b4
                                                              • Opcode Fuzzy Hash: fc4e61dde0ff008e1d8a73e250225d59bce6c42b06b9f0136b307f8bf316a4bf
                                                              • Instruction Fuzzy Hash: 148114B1D182989AF7248A24DC18BFA7B75EF51300F0841FED58D97281DABD0FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 670 4120dd-4123f4 673 412cf2-41307f call 412d0d call 413065 670->673 674 4123fa-412581 call 4124af 670->674 680 412583-41258d 674->680 681 412592-4125dd 674->681 682 412839-412872 680->682 683 4125df-4125e9 681->683 684 4125ee-412652 681->684 686 4128b5-412913 682->686 687 412874-4128b0 682->687 683->682 692 412656-412717 684->692 693 412915-412921 686->693 694 412926-41293b 686->694 697 4133dd-41343a call 41340b VirtualProtect 687->697 710 412719-41272c 692->710 711 41272e-41273b 692->711 700 412c17-412c1e 693->700 695 41293d-412949 694->695 696 41294e-41296d 694->696 695->700 701 412980-412992 696->701 702 41296f-41297b 696->702 722 413482-4134ca call 4134cb 697->722 723 41343c-41347a 697->723 700->673 706 412c24-412caf 700->706 707 4129a5-412a0e 701->707 708 412994-4129a0 701->708 702->700 706->673 733 412cb1-412ced 706->733 720 412a14-412a5e 707->720 721 412c0b-412c11 707->721 708->700 715 412788-41278f 710->715 711->692 716 412741-412751 711->716 718 4127d1-4127e8 call 4127ed 715->718 719 412791-4127cf 715->719 716->692 724 412757-412764 716->724 718->682 719->682 727 412a6f-412a80 720->727 721->700 723->722 729 412772 724->729 730 412766-412770 724->730 735 412b21-412b72 call 412b40 727->735 736 412a86-412a96 727->736 732 41277c-412782 729->732 730->732 732->715 733->697 752 412b80-412bd7 735->752 753 412b74-412b7e 735->753 736->735 740 412a9c-412aed 736->740 749 412b13 740->749 750 412aef-412b11 740->750 749->727 750->749 754 412b1a 750->754 759 412be5 752->759 760 412bd9-412be3 752->760 755 412bef-412bf6 753->755 754->735 757 412c06 755->757 758 412bf8-412c04 755->758 757->700 758->700 759->755 760->755
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: 3f5f1c73003a61d64382a1ffdaab053f56a11a512176f9075d5541ddeb027913
                                                              • Instruction ID: 0932d5da3f2e09af89d36d567ccae22f9a0e807030d037efefe15e26e8eef01a
                                                              • Opcode Fuzzy Hash: 3f5f1c73003a61d64382a1ffdaab053f56a11a512176f9075d5541ddeb027913
                                                              • Instruction Fuzzy Hash: FA8148B1D081689AF7248A24DC18BFB7675EF51300F0841FED94D97281DABE0FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 761 412151-4123f4 763 412cf2-41307f call 412d0d call 413065 761->763 764 4123fa-412581 call 4124af 761->764 770 412583-41258d 764->770 771 412592-4125dd 764->771 772 412839-412872 770->772 773 4125df-4125e9 771->773 774 4125ee-412652 771->774 776 4128b5-412913 772->776 777 412874-4128b0 772->777 773->772 782 412656-412717 774->782 783 412915-412921 776->783 784 412926-41293b 776->784 787 4133dd-41343a call 41340b VirtualProtect 777->787 800 412719-41272c 782->800 801 41272e-41273b 782->801 790 412c17-412c1e 783->790 785 41293d-412949 784->785 786 41294e-41296d 784->786 785->790 791 412980-412992 786->791 792 41296f-41297b 786->792 812 413482-4134ca call 4134cb 787->812 813 41343c-41347a 787->813 790->763 796 412c24-412caf 790->796 797 4129a5-412a0e 791->797 798 412994-4129a0 791->798 792->790 796->763 823 412cb1-412ced 796->823 810 412a14-412a5e 797->810 811 412c0b-412c11 797->811 798->790 805 412788-41278f 800->805 801->782 806 412741-412751 801->806 808 4127d1-4127e8 call 4127ed 805->808 809 412791-4127cf 805->809 806->782 814 412757-412764 806->814 808->772 809->772 817 412a6f-412a80 810->817 811->790 813->812 819 412772 814->819 820 412766-412770 814->820 825 412b21-412b72 call 412b40 817->825 826 412a86-412a96 817->826 822 41277c-412782 819->822 820->822 822->805 823->787 842 412b80-412bd7 825->842 843 412b74-412b7e 825->843 826->825 830 412a9c-412aed 826->830 839 412b13 830->839 840 412aef-412b11 830->840 839->817 840->839 844 412b1a 840->844 849 412be5 842->849 850 412bd9-412be3 842->850 845 412bef-412bf6 843->845 844->825 847 412c06 845->847 848 412bf8-412c04 845->848 847->790 848->790 849->845 850->845
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: 0a9c43b938229f10e82f6b4b4ee82d3ccbb59e176c0801c33592ffeeaba2b152
                                                              • Instruction ID: 0e2c899ebebb08ab941a628e4290d049498fc0f686630e80d5ac1488c25fb5cc
                                                              • Opcode Fuzzy Hash: 0a9c43b938229f10e82f6b4b4ee82d3ccbb59e176c0801c33592ffeeaba2b152
                                                              • Instruction Fuzzy Hash: 998126B1D082588AF7248B24DC18BFA7A75EF51300F0841FED58D97281DABD5FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 851 412341-4123f4 853 412cf2-41307f call 412d0d call 413065 851->853 854 4123fa-412581 call 4124af 851->854 860 412583-41258d 854->860 861 412592-4125dd 854->861 862 412839-412872 860->862 863 4125df-4125e9 861->863 864 4125ee-412652 861->864 866 4128b5-412913 862->866 867 412874-4128b0 862->867 863->862 872 412656-412717 864->872 873 412915-412921 866->873 874 412926-41293b 866->874 877 4133dd-41343a call 41340b VirtualProtect 867->877 890 412719-41272c 872->890 891 41272e-41273b 872->891 880 412c17-412c1e 873->880 875 41293d-412949 874->875 876 41294e-41296d 874->876 875->880 881 412980-412992 876->881 882 41296f-41297b 876->882 902 413482-4134ca call 4134cb 877->902 903 41343c-41347a 877->903 880->853 886 412c24-412caf 880->886 887 4129a5-412a0e 881->887 888 412994-4129a0 881->888 882->880 886->853 913 412cb1-412ced 886->913 900 412a14-412a5e 887->900 901 412c0b-412c11 887->901 888->880 895 412788-41278f 890->895 891->872 896 412741-412751 891->896 898 4127d1-4127e8 call 4127ed 895->898 899 412791-4127cf 895->899 896->872 904 412757-412764 896->904 898->862 899->862 907 412a6f-412a80 900->907 901->880 903->902 909 412772 904->909 910 412766-412770 904->910 915 412b21-412b72 call 412b40 907->915 916 412a86-412a96 907->916 912 41277c-412782 909->912 910->912 912->895 913->877 932 412b80-412bd7 915->932 933 412b74-412b7e 915->933 916->915 920 412a9c-412aed 916->920 929 412b13 920->929 930 412aef-412b11 920->930 929->907 930->929 934 412b1a 930->934 939 412be5 932->939 940 412bd9-412be3 932->940 935 412bef-412bf6 933->935 934->915 937 412c06 935->937 938 412bf8-412c04 935->938 937->880 938->880 939->935 940->935
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: dfdae454c89a602625f1194840656c29d7bbb1ba9c80772e418ffc362118d63d
                                                              • Instruction ID: c6e788f54a623af09272f5e8fd3885d6c26ec73b86091fbbf0ae000181525045
                                                              • Opcode Fuzzy Hash: dfdae454c89a602625f1194840656c29d7bbb1ba9c80772e418ffc362118d63d
                                                              • Instruction Fuzzy Hash: 8E8126B1E182688AF7248B24DC19BFA7675EF51300F0840FED54D97281DABD1FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 941 429a69-429a7c 942 429a96-429aa6 941->942 943 429a7e-429a94 941->943 945 4299b5-429a52 call 4299e3 call 429a53 942->945 946 429aac-429abf 942->946 944 429af9-429b00 943->944 947 429b42-429b69 call 429b6a 944->947 948 429b02-429b40 944->948 960 429baa-429be3 945->960 946->945 950 429ac5-429ad5 946->950 947->960 948->960 954 429ae3 950->954 955 429ad7-429ae1 950->955 959 429aed-429af3 954->959 955->959 959->944 962 42a4f6-42a504 call 42a505 960->962 963 429be9-429d70 960->963 964 429d72-429d7c 963->964 965 429d81-429dcc call 429db2 963->965 967 42a03d-42a076 964->967 974 429dce-429dd8 965->974 975 429ddd-429e02 call 429e03 965->975 972 42a078-42ac1e VirtualProtect 967->972 973 42a0b9-42a117 967->973 984 42ac24 972->984 978 42a12a-42a13f 973->978 979 42a119-42a125 973->979 974->967 975->967 982 42a152-42a171 978->982 983 42a141-42a14d 978->983 981 42a41b-42a422 979->981 981->962 988 42a428-42a43c call 42a43f 981->988 985 42a173-42a17f 982->985 986 42a184-42a196 982->986 983->981 984->984 985->981 989 42a198-42a1a4 986->989 990 42a1a9-42a212 986->990 989->981 994 42a218-42a262 990->994 995 42a40f-42a415 990->995 996 42a273-42a284 994->996 995->981 997 42a325-42a376 996->997 998 42a28a-42a29a 996->998 1001 42a384-42a396 call 42a397 997->1001 1002 42a378-42a382 997->1002 998->997 1000 42a2a0-42a2f1 998->1000 1006 42a2f3-42a315 1000->1006 1007 42a317 1000->1007 1004 42a3f3-42a3fa 1001->1004 1002->1004 1009 42a40a 1004->1009 1010 42a3fc-42a408 1004->1010 1006->1007 1011 42a31e 1006->1011 1007->996 1009->981 1010->981 1011->997
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 0-4069139063
                                                              • Opcode ID: 34a0e3389018522a20c7abc802efd46577c8738f3168decba13d25fbf94e9783
                                                              • Instruction ID: bb40d18a901eb47d33f184b3623ae0e726c83ac5be5c1cfb015d8eb32de8a1af
                                                              • Opcode Fuzzy Hash: 34a0e3389018522a20c7abc802efd46577c8738f3168decba13d25fbf94e9783
                                                              • Instruction Fuzzy Hash: D261F862D056789AF7208618EC54BEBBA75EF95310F0440FAD80D67381D67D0FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1013 4298d2-4298dd 1014 4298ee-429919 call 42991a 1013->1014 1015 4298df-4298e9 1013->1015 1016 429baa-429be3 1014->1016 1015->1016 1019 42a4f6-42a504 call 42a505 1016->1019 1020 429be9-429d70 1016->1020 1021 429d72-429d7c 1020->1021 1022 429d81-429dcc call 429db2 1020->1022 1024 42a03d-42a076 1021->1024 1031 429dce-429dd8 1022->1031 1032 429ddd-429e02 call 429e03 1022->1032 1029 42a078-42ac1e VirtualProtect 1024->1029 1030 42a0b9-42a117 1024->1030 1041 42ac24 1029->1041 1035 42a12a-42a13f 1030->1035 1036 42a119-42a125 1030->1036 1031->1024 1032->1024 1039 42a152-42a171 1035->1039 1040 42a141-42a14d 1035->1040 1038 42a41b-42a422 1036->1038 1038->1019 1045 42a428-42a43c call 42a43f 1038->1045 1042 42a173-42a17f 1039->1042 1043 42a184-42a196 1039->1043 1040->1038 1041->1041 1042->1038 1046 42a198-42a1a4 1043->1046 1047 42a1a9-42a212 1043->1047 1046->1038 1051 42a218-42a262 1047->1051 1052 42a40f-42a415 1047->1052 1053 42a273-42a284 1051->1053 1052->1038 1054 42a325-42a376 1053->1054 1055 42a28a-42a29a 1053->1055 1058 42a384-42a396 call 42a397 1054->1058 1059 42a378-42a382 1054->1059 1055->1054 1057 42a2a0-42a2f1 1055->1057 1063 42a2f3-42a315 1057->1063 1064 42a317 1057->1064 1061 42a3f3-42a3fa 1058->1061 1059->1061 1066 42a40a 1061->1066 1067 42a3fc-42a408 1061->1067 1063->1064 1068 42a31e 1063->1068 1064->1053 1066->1038 1067->1038 1068->1054
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: L$L$W$a$a$b$d$i$o$r$r$y
                                                              • API String ID: 544645111-4069139063
                                                              • Opcode ID: a4f2cc83fd25b43c880f457718923c8d6c9d5393405ca4fd47fdf62dafc658ac
                                                              • Instruction ID: 042edc216b3e55aeb17dc9248a9c3bf40472790a1d3d36c57cba72205035dd1c
                                                              • Opcode Fuzzy Hash: a4f2cc83fd25b43c880f457718923c8d6c9d5393405ca4fd47fdf62dafc658ac
                                                              • Instruction Fuzzy Hash: 6161E4B2D056689AF7208A14EC48BDBBA75EF95310F0440FAD80D67381D77E1FC58B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: N4MX
                                                              • API String ID: 544645111-1502238160
                                                              • Opcode ID: f11d1bb817282c64f34785b54cabdf17bbfeedca4a9dda8212e302c361634348
                                                              • Instruction ID: b3f5b6423f395c244fce6fed571d57211f79f9b2d6e9c3ee9c7ed50247b8c568
                                                              • Opcode Fuzzy Hash: f11d1bb817282c64f34785b54cabdf17bbfeedca4a9dda8212e302c361634348
                                                              • Instruction Fuzzy Hash: 003104B2D055288BEB28CB15DCA4AEE7774EF51301F1441EBDC4EA6281DA385FC18F46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 85e99cd5a47543cf23504f473b9bf5c8599838782771636059b4f93a9c6f9652
                                                              • Instruction ID: 2c8b9bda661ad755a434faba9ec98905579431e814de408f6a20122d7e8b7f06
                                                              • Opcode Fuzzy Hash: 85e99cd5a47543cf23504f473b9bf5c8599838782771636059b4f93a9c6f9652
                                                              • Instruction Fuzzy Hash: 648115B4E046688BDB24CF18DD90BEAB7B2FB49305F5081DAD909A6240D7386ED1CF45
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 135ad8f401c570e547fbf9a6de295c8c17f8dda64c5c229e09ebee3bb5fcf79a
                                                              • Instruction ID: dfbcb6e350ca6daac2073d7a5693b62bf6c30249a9d3e92a5530cb6827dd7c6a
                                                              • Opcode Fuzzy Hash: 135ad8f401c570e547fbf9a6de295c8c17f8dda64c5c229e09ebee3bb5fcf79a
                                                              • Instruction Fuzzy Hash: EF61BFB1D091688BEB24CF14DCA4AEA77B5EF51305F1441EBD84DA7281CA38AFC18F46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e28487ae78aae608eab2d2545161ebf6b19cc82376cf4a3329a4bb4d8ba58691
                                                              • Instruction ID: 8a28322eea80c35ed31c940487fd920fc6f79380003dd6abe1bcef62602e9b35
                                                              • Opcode Fuzzy Hash: e28487ae78aae608eab2d2545161ebf6b19cc82376cf4a3329a4bb4d8ba58691
                                                              • Instruction Fuzzy Hash: B65136B2E081245BF7248E14DD94BEB7779EB81310F1442FBD90EA6680D67C5FC28E92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: a111785dfbe2817b58ca473b5518de423a8a8d1cb2e3dbdde65fca0c7fcf4730
                                                              • Instruction ID: 06b26d028aab56ecb794729ee0f40b45cc42f6d3e09ee1d036040c6ecc2af9c4
                                                              • Opcode Fuzzy Hash: a111785dfbe2817b58ca473b5518de423a8a8d1cb2e3dbdde65fca0c7fcf4730
                                                              • Instruction Fuzzy Hash: 8651C3B1D0523A8AE7748B15ED80AFAB7B5EF44310F1141FAE90EA7680E6380EC5DB55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8d0d774cc60a1277266344d9a1fb94b7b47d5551565a28cd2dbd30bcd3532b61
                                                              • Instruction ID: a7573cebef2906136f3b0afa02416dd457adb12610608d86b69f38783993b9e9
                                                              • Opcode Fuzzy Hash: 8d0d774cc60a1277266344d9a1fb94b7b47d5551565a28cd2dbd30bcd3532b61
                                                              • Instruction Fuzzy Hash: 635124B2E091285BE7248F14DD94BEB7778EB91300F1442FBD90EA6240D67C5FC28E92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 06ed781546dfaab0410d8f1601ff8999c258ca6fa91cc60a85133b2424d3d6fb
                                                              • Instruction ID: a21c00fcc79bcb22c0189e895f9f026ca7bd4bd9f74cecf27bce5705025881a3
                                                              • Opcode Fuzzy Hash: 06ed781546dfaab0410d8f1601ff8999c258ca6fa91cc60a85133b2424d3d6fb
                                                              • Instruction Fuzzy Hash: 6951D4B1E055688FEB24CE14DDA0BEA7775EF52301F1841EBD84DA6241C6789FC18F46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 13c5e14ee55dbd15f3ab06fe932220a595597ec4c5d0aa910d5f7586367bcf7b
                                                              • Instruction ID: 8b1e8a8b4b9fe39592d6023537de683c691bb1d6e881ea4865a9a601a5f537c3
                                                              • Opcode Fuzzy Hash: 13c5e14ee55dbd15f3ab06fe932220a595597ec4c5d0aa910d5f7586367bcf7b
                                                              • Instruction Fuzzy Hash: DD4117B3E081245BF7248A15DD94BEA7779EB91310F1442FBD90EA2680DA7C5FC28E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: d53df6c52190f82a045b6abde2f32d1064df78d50e7a5319fa32487c77a96465
                                                              • Instruction ID: 47bb9fdaa8cb8e402b1783fa67dceefd33b25e5bb368d2eb5044f5deabe5d923
                                                              • Opcode Fuzzy Hash: d53df6c52190f82a045b6abde2f32d1064df78d50e7a5319fa32487c77a96465
                                                              • Instruction Fuzzy Hash: E04138F2D091186BF7288A15EC55BFB3679DB90310F1482BFD90E92180DA7C5FC28A56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eaea2b933b01a89827b67c139bb5ca4e79706c959fd518baf920d729aa146994
                                                              • Instruction ID: 990449a8e8947083cfe3145af18ca691894774e68658affb907c9d8a4752bbdd
                                                              • Opcode Fuzzy Hash: eaea2b933b01a89827b67c139bb5ca4e79706c959fd518baf920d729aa146994
                                                              • Instruction Fuzzy Hash: 794107B2E091245BE7248B14DD54BFB7779EB91310F1442FBD90EA2640D67C5FC28E92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: aa651d2d9aad907c587bd699a1e9d2807f77056f8f2d7e2648479a82859bb8f8
                                                              • Instruction ID: 4034f9df38b031ca94e96c70c39b379e6a7100b7d5f9d14358dc1f3ad1fdf1c9
                                                              • Opcode Fuzzy Hash: aa651d2d9aad907c587bd699a1e9d2807f77056f8f2d7e2648479a82859bb8f8
                                                              • Instruction Fuzzy Hash: DE4139F2D041245BF7288A15EC55BFB7779DB90310F1481BFD90E92180DA7C5FC18A56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(00000000,?,00000040,00000000,00000001,?,00413088,00000001,0041305B,00000000,?,00412E23,00000001,00000001,00000000,?), ref: 00413432
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: f6cae4a27bb97715e265dba5960fc416d3247b530a20a7857318f27e437f2bc0
                                                              • Instruction ID: ad96599aa0568e0401edef16a262a4e3169132a17c7bd816b0e54d29e73f2ef4
                                                              • Opcode Fuzzy Hash: f6cae4a27bb97715e265dba5960fc416d3247b530a20a7857318f27e437f2bc0
                                                              • Instruction Fuzzy Hash: D23125F3E081145BF7288A14EC55AFB7729DB91310F1582BFD90E62281DA7C5FC28A56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: a55e3ad4a1909545bdfbef2483007a1dd5747761257bb13a183ba3933f5cb567
                                                              • Instruction ID: 4ca0f828d6bd0722fb9e6ed604088adf18c745b3b7f6fe70d16349ed05d5e27d
                                                              • Opcode Fuzzy Hash: a55e3ad4a1909545bdfbef2483007a1dd5747761257bb13a183ba3933f5cb567
                                                              • Instruction Fuzzy Hash: 293137B3E081285BE7248A15DC54AEA777DDB91300F1541FBDD0EE2181DA7C9FC28E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 9ff16c9d8587bb0fef7ac9e42add81c87f0d8d1ca4d7f84eb8d5769146e2583a
                                                              • Instruction ID: ec29e408a0b2560fbee962219c1d550d8966c44ba49c21dec977af826ca43344
                                                              • Opcode Fuzzy Hash: 9ff16c9d8587bb0fef7ac9e42add81c87f0d8d1ca4d7f84eb8d5769146e2583a
                                                              • Instruction Fuzzy Hash: 323127B3E081285BE7258A15DC98AEA777CDB91300F0442FBDD0EE2140DA3C9FC58E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 95bcb04d5a536c814609ae895372c7fcf05f56ce0913c76de9db09cdd2a53f63
                                                              • Instruction ID: 6da0136704a98be01a017522292e7ddc84d60c089fd73c4cbd77c81446849781
                                                              • Opcode Fuzzy Hash: 95bcb04d5a536c814609ae895372c7fcf05f56ce0913c76de9db09cdd2a53f63
                                                              • Instruction Fuzzy Hash: 2831E1B1D046288BEB248F15DC95AEAB774EB15301F0401EED94EA6241DA38AFC18F41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a21d2ff6d935114ef620497caab0ba85e1609837715adc9d01c394d9a7ce82b
                                                              • Instruction ID: ecd5b4522e6c4e6edcdb18aee9633c546c3a95a7d69b10dba29616feaf965f23
                                                              • Opcode Fuzzy Hash: 7a21d2ff6d935114ef620497caab0ba85e1609837715adc9d01c394d9a7ce82b
                                                              • Instruction Fuzzy Hash: 0C41B070E046688BDB24CA14DD907FBBBB1EF46306F5480EBD949A6600D6395ED0CF46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 3c923280d445580e831e8e5f465ea2d7ba5d979e576ef596b518e963108ace4f
                                                              • Instruction ID: ea780e03613d9591d4d41f98bfe64335b6b815f6f6f40fceb2ce551db5009c8f
                                                              • Opcode Fuzzy Hash: 3c923280d445580e831e8e5f465ea2d7ba5d979e576ef596b518e963108ace4f
                                                              • Instruction Fuzzy Hash: 7121F2B2D085285BE7288B05DC65AEA7778EB55301F0441EFDD0EA2281DA386FC18E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 4795ca1c476092ecabfd849bac8cadd5b4e3608008a04d92fe2d8ed5a806e6e2
                                                              • Instruction ID: e62362c9a46b7741eebc7eabbab287c69e11e0caa91c1d28b0053fff01eea8c4
                                                              • Opcode Fuzzy Hash: 4795ca1c476092ecabfd849bac8cadd5b4e3608008a04d92fe2d8ed5a806e6e2
                                                              • Instruction Fuzzy Hash: F421F2B2D085285BE7288B05DC65AEA7778EB55301F1441EBDD0EA2281DA386FC18E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 23794bd0eb24a83d80c83d3f3a95ec04e9a9e91ed29d618bca08fb0f3765c9ca
                                                              • Instruction ID: b7950e2199067da6556c6f44021988e33d1598b5d1187de5442621625711592a
                                                              • Opcode Fuzzy Hash: 23794bd0eb24a83d80c83d3f3a95ec04e9a9e91ed29d618bca08fb0f3765c9ca
                                                              • Instruction Fuzzy Hash: F121F2B2D085285BE7248B05DC65AEA7778EB55301F0441EBDD0EA2281DA386FC18E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 9ce11b6630ba050c5a3dbf3275fb29dd6160c5ce0a228f6ec4948b1704cf21d6
                                                              • Instruction ID: 964f5b427979de83e52e4b06fdd8c7444ce8f0a86905a94d76b32b0d0394eae5
                                                              • Opcode Fuzzy Hash: 9ce11b6630ba050c5a3dbf3275fb29dd6160c5ce0a228f6ec4948b1704cf21d6
                                                              • Instruction Fuzzy Hash: 202135B2D085285BE7248A05EC65BFA7778DB51301F0441FBDD0EA2181DA385FC18E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: fce3c9e70c013ae024447a0b1b7f0d7a0b9c693d9ab3e45efcb0a6e8f28ddc39
                                                              • Instruction ID: 556953f433954b4634cf63b90a6ebecca45b76565d7a49542567df38541f697a
                                                              • Opcode Fuzzy Hash: fce3c9e70c013ae024447a0b1b7f0d7a0b9c693d9ab3e45efcb0a6e8f28ddc39
                                                              • Instruction Fuzzy Hash: FB1129B3D005385BE7208A08ED08BEB7B78EB44310F4501FBEA0E66640D63D5ED68F96
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: ddd743a6013bca8144503c343c6e3dabd5e5e8c74316471d4ee10e03dab04565
                                                              • Instruction ID: c6b9b15dfea78e486ce1d6701f6cbbc0d34b0132964ab746a0c497b408296b16
                                                              • Opcode Fuzzy Hash: ddd743a6013bca8144503c343c6e3dabd5e5e8c74316471d4ee10e03dab04565
                                                              • Instruction Fuzzy Hash: 2311E7B3D101389BE7248A04ED08BEB7B75AB54310F0501BAE90E66640E7385ED5CB52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 57d98445e9ce9f9e60224b3280659e125f486fcffcf31615c55256045fce7212
                                                              • Instruction ID: 37484f35a9ec51a60977f212ebe0a7e812490ded26ab04b9ef7e0a040bed9078
                                                              • Opcode Fuzzy Hash: 57d98445e9ce9f9e60224b3280659e125f486fcffcf31615c55256045fce7212
                                                              • Instruction Fuzzy Hash: CD012970E046688BCB30CB45DC40BDEB7B2BB49342F5082DBD94AA6244D3746EC1CF46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0042AC1E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 833b4d87fe1af18a22aecd40cce08895c07c35ed3990c15f8b844ad01f083fc8
                                                              • Instruction ID: a29ea879c4ef05d678e0999b02b84f472cf4dd45ce2750cad96914442ff99ba1
                                                              • Opcode Fuzzy Hash: 833b4d87fe1af18a22aecd40cce08895c07c35ed3990c15f8b844ad01f083fc8
                                                              • Instruction Fuzzy Hash: CFE0EDB19001289BD724CA48DD84ADAB7B8EB0C301F1041D6EA0EE6200E2756EC58F56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ExitProcess.KERNEL32(00000000), ref: 0042C036
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExitProcess
                                                              • String ID:
                                                              • API String ID: 621844428-0
                                                              • Opcode ID: 01e8516e96a7b821d84dd7f040e11c91f21bf69e889b62971969fad3d0b5e555
                                                              • Instruction ID: b92e842a934dc99345efe68ee0b6e9c68736d6021a919a7cb4bce8b1c6a369cf
                                                              • Opcode Fuzzy Hash: 01e8516e96a7b821d84dd7f040e11c91f21bf69e889b62971969fad3d0b5e555
                                                              • Instruction Fuzzy Hash: 5FD012A2E14130A6F3601544BC457EA7A28DB42320F350073DD0EA5580C6BD1BC65AD7
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7d66450f66615e8754289d71f7ce8b27221215efdc8e862ed00508b3e6ec40c2
                                                              • Instruction ID: 0cbf90eee9db89d5c1d60e7f7d2040ba1e2991a0e1e34b0cdb0372245e5a11af
                                                              • Opcode Fuzzy Hash: 7d66450f66615e8754289d71f7ce8b27221215efdc8e862ed00508b3e6ec40c2
                                                              • Instruction Fuzzy Hash:
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ___getlocaleinfo
                                                              • String ID:
                                                              • API String ID: 1937885557-0
                                                              • Opcode ID: 51dcb22c4dc93a7f30a99e81a1e24136c466f284c556936e1c7157a4ebd90518
                                                              • Instruction ID: fd67e2181e606d744a6158f7a2df29ca0b8827f53dc611e391066ddd0200f471
                                                              • Opcode Fuzzy Hash: 51dcb22c4dc93a7f30a99e81a1e24136c466f284c556936e1c7157a4ebd90518
                                                              • Instruction Fuzzy Hash: 1AE112B294060EBEEF11DAF1CC85DFF77BDEF48348F00496AB216D6040EA74AA159760
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(00000005,?,7622DFA0,?,00408984,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 00408395
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083B9
                                                              • GetLastError.KERNEL32(?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083DA
                                                              • _wcsrchr.LIBCMT ref: 00408443
                                                              • _wcsncpy.LIBCMT ref: 00408472
                                                              • _strerror.LIBCMT ref: 004084ED
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000003), ref: 00408522
                                                              • _wcsncpy.LIBCMT ref: 00408552
                                                              • LoadLibraryW.KERNEL32(00000044,?,?,?,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000), ref: 0040855B
                                                              • LoadLibraryW.KERNEL32(wininet.dll,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 0040857C
                                                              • LoadLibraryW.KERNEL32(mqutil.dll,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 004085B6
                                                              • LoadLibraryW.KERNEL32(netmsg.dll,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 004085F2
                                                              • FormatMessageW.KERNEL32(00001300,?,?,00000000,?,00000000,00000000), ref: 00408632
                                                              • _wcstok.LIBCMT ref: 00408648
                                                              • _vswprintf_s.LIBCMT ref: 00408683
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast$_wcsncpy$ByteCharFormatMessageMultiWide__getptd_noexit_strerror_vswprintf_s_wcsrchr_wcstok
                                                              • String ID: __crt$mqutil.dll$netmsg.dll$t,F$wininet.dll
                                                              • API String ID: 2660907230-770268917
                                                              • Opcode ID: faf70c990ec09a4e37772fbcd2026de65b54342e9bca4560a10c4358c1de2a0c
                                                              • Instruction ID: 47c072ff33d92121b9efd564083845d0c83aee102c006f26be13eb141e8ab587
                                                              • Opcode Fuzzy Hash: faf70c990ec09a4e37772fbcd2026de65b54342e9bca4560a10c4358c1de2a0c
                                                              • Instruction Fuzzy Hash: F7C1C271A007059FCB209F75C9857ABB7B5EF58300F14893EE89AE7391EB789900CB59
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __invoke_watson_strcpy_s
                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN$?$T
                                                              • API String ID: 3990783250-1230703744
                                                              • Opcode ID: b9824949ee98a60961a2741ce67b44a1c789cd02af29c55459a49a82930a3c8c
                                                              • Instruction ID: 0467dba7ca231f73abc79560afe158a2f8043ccf4e020c15938fcbbf0078de2d
                                                              • Opcode Fuzzy Hash: b9824949ee98a60961a2741ce67b44a1c789cd02af29c55459a49a82930a3c8c
                                                              • Instruction Fuzzy Hash: D562C132D0465A8BDF25CFA8C4402EEB7B1FF14301F55826BD855AB382D778494ACB99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 00403EB1
                                                              • GetFileSizeEx.KERNEL32(?,?,00000000), ref: 00403EC3
                                                              • _malloc.LIBCMT ref: 00403EF5
                                                              • SetLastError.KERNEL32(00000008,?,00004000), ref: 00403F05
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorFileLastSize_malloc_memset
                                                              • String ID: N/f$.\QHImageHlp.c$GetFileSizeEx()$INIT$PE
                                                              • API String ID: 942205088-2408646100
                                                              • Opcode ID: f120680d6d03f252c3602562e683275613980ac0dca386cd390d9ba89285534a
                                                              • Instruction ID: 1e5c7d978d549367c3184b98c0c7fe6c27fb078ad7ff0f1d351f26898f72a1fe
                                                              • Opcode Fuzzy Hash: f120680d6d03f252c3602562e683275613980ac0dca386cd390d9ba89285534a
                                                              • Instruction Fuzzy Hash: 0AE1A0B1A043009BDB24DF15D841B6B76E4BBD4704F04493EFE89AB3C1E778DA458B9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00406249
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,75B4E8E0,004060C2,00000000,00002000,?,00000000,00000000,00401596,?,?,?,00401C5E,?,?), ref: 00406259
                                                              • CreateFileA.KERNEL32(00000000,00000000,00000003,00000000,00000003,00000080,00000000,00000000,00002000,75B4E8E0,004060C2,00000000,00002000,?,00000000,00000000), ref: 004062A0
                                                              • _memset.LIBCMT ref: 004062CA
                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,00000000,00002800,?,00000000), ref: 004062EB
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040631A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocCloseControlCreateDeviceErrorFileHandleHeapLast_malloc_memset
                                                              • String ID: DISKID:$\\.\PhysicalDrive%d
                                                              • API String ID: 2265051123-3765948602
                                                              • Opcode ID: 26cbdce573063f43a07f417fe75e999626897c1eb521f0934345e71a245bb68b
                                                              • Instruction ID: a225908e938814fc6ce8db3e87b0bc4a74b0325d29c7787301f826e6074e7c24
                                                              • Opcode Fuzzy Hash: 26cbdce573063f43a07f417fe75e999626897c1eb521f0934345e71a245bb68b
                                                              • Instruction Fuzzy Hash: 7031EE71644304AFD200EF65EC81E2B77E8EB84758F94053FF845962C1DB74E958879B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 0040BB1A
                                                              • OpenThread.KERNEL32(00000040,00000001,-00000008,00000000,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF), ref: 0040BB75
                                                              • GetLastError.KERNEL32(?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C), ref: 0040BB7B
                                                              • GetProcessHeap.KERNEL32(?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C), ref: 0040BBAA
                                                              • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF), ref: 0040BBB4
                                                              • OutputDebugStringW.KERNEL32(****** ,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC), ref: 0040BBC1
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC), ref: 0040BBCA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: HeapThread$CloseCurrentDebugErrorFreeHandleLastOpenOutputProcessString
                                                              • String ID: ******
                                                              • API String ID: 2450575844-1974978773
                                                              • Opcode ID: 4bb51ded7a3608d7d97a1e27c24b296467d0de8f0afda4e18d8d8d35c90d2ed4
                                                              • Instruction ID: ba7dbfe72a5486ef3152b13babee1143b1853603010718cc7a74b18ee6d804c4
                                                              • Opcode Fuzzy Hash: 4bb51ded7a3608d7d97a1e27c24b296467d0de8f0afda4e18d8d8d35c90d2ed4
                                                              • Instruction Fuzzy Hash: FC315A34604B019FC7149B24CC94B6B77A4EF45702F04457EE985A7795E738F8008F9E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00403370: _vswprintf_s.LIBCMT ref: 0040339C
                                                              • CreateFileA.KERNEL32(00000000,00000000,00000003,00000000,00000003,00000080,00000000,00000000,00002000,75B4E8E0,004060C2,00000000,00002000,?,00000000,00000000), ref: 004062A0
                                                              • _memset.LIBCMT ref: 004062CA
                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,00000000,00002800,?,00000000), ref: 004062EB
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040631A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseControlCreateDeviceFileHandle_memset_vswprintf_s
                                                              • String ID: DISKID:$\\.\PhysicalDrive%d
                                                              • API String ID: 2627556037-3765948602
                                                              • Opcode ID: 09db851be27ea68fc9fc6b10bab77541122b50d849f044dcab3b52a8cc0bc6df
                                                              • Instruction ID: 51abea45773ed5e4c9772979f595ec269391c6619f1927a7e50f4261b4a66d35
                                                              • Opcode Fuzzy Hash: 09db851be27ea68fc9fc6b10bab77541122b50d849f044dcab3b52a8cc0bc6df
                                                              • Instruction Fuzzy Hash: 2F11C671604300AFD210DF55EC86F2B77D8EB84748F90053EF945E62C1E774A9188BAA
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8$MHO2$^Q$n$n$x
                                                              • API String ID: 0-2848278162
                                                              • Opcode ID: f5a8caf9bc1f093c5d593e4e61edb6814425662af97e89af7f78678314f69f29
                                                              • Instruction ID: 2c749dc8eec8f9cf2b864a6f0df5ba9062d9c37d5de09f0db79b4939017d85b8
                                                              • Opcode Fuzzy Hash: f5a8caf9bc1f093c5d593e4e61edb6814425662af97e89af7f78678314f69f29
                                                              • Instruction Fuzzy Hash: 5E8129B3C011554FF728CB24DE89AEABBB9EB80304F0481FED4096A9D4D3795BC58E52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32 ref: 00434B8F
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00434BA4
                                                              • UnhandledExceptionFilter.KERNEL32(0045F6C0), ref: 00434BAF
                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00434BCB
                                                              • TerminateProcess.KERNEL32(00000000), ref: 00434BD2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                              • String ID:
                                                              • API String ID: 2579439406-0
                                                              • Opcode ID: 1aedecd378c2f8c13ed6721df79a08be873a1827c1eaed0c0787769e19c8aa15
                                                              • Instruction ID: c87577094888f478b7fe3db4e50f5c35210d74469f5d620301a0bbfa5ab1ebb5
                                                              • Opcode Fuzzy Hash: 1aedecd378c2f8c13ed6721df79a08be873a1827c1eaed0c0787769e19c8aa15
                                                              • Instruction Fuzzy Hash: 2521EFB4511B44AFD700DF24E988A443BA0FB18305F18613AE949A6271F7F4A9A5CF4F
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32 ref: 00434B8F
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00434BA4
                                                              • UnhandledExceptionFilter.KERNEL32(0045F6C0), ref: 00434BAF
                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00434BCB
                                                              • TerminateProcess.KERNEL32(00000000), ref: 00434BD2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                              • String ID:
                                                              • API String ID: 2579439406-0
                                                              • Opcode ID: 5251d79271cddf4743badf86185e3d261b160beed6636030c849ce3be4a5960e
                                                              • Instruction ID: 886c9f54bc9d7ea2895ebc2780101683a97b709e5cc55707079ea216c227a8b2
                                                              • Opcode Fuzzy Hash: 5251d79271cddf4743badf86185e3d261b160beed6636030c849ce3be4a5960e
                                                              • Instruction Fuzzy Hash: 01011D70505780AFE300DF70EC497143B70E70970AF1410AAE606DA1B3E6B55881CF5F
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • <%08X> %02hu:%02hu:%02hu: , xrefs: 0040914A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentLocalThreadTime__swprintf
                                                              • String ID: <%08X> %02hu:%02hu:%02hu:
                                                              • API String ID: 4156772881-2163415560
                                                              • Opcode ID: a489dfab2371dc3eae81d2dfc5bda05dd664b81eb9ee3823ab1e5aa6a003ac84
                                                              • Instruction ID: be5f41c029d6ecaa3ec51ae336b2f33e16603824fff27754019517003b9c3123
                                                              • Opcode Fuzzy Hash: a489dfab2371dc3eae81d2dfc5bda05dd664b81eb9ee3823ab1e5aa6a003ac84
                                                              • Instruction Fuzzy Hash: 35F08276400711BBC3106B198D458BB76E8EEC4711B448956FC85C6292F678DD24C2A5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID: 8$^Q$n$n$x
                                                              • API String ID: 544645111-2519598271
                                                              • Opcode ID: 7e7bdfab31fffe7520be891b3dda0984837ea78a8b943c97327483621f4c4cba
                                                              • Instruction ID: f0d6c34fff78d01d527dda224145d5394760bc0a89aff5a6d27e5324e8b1942f
                                                              • Opcode Fuzzy Hash: 7e7bdfab31fffe7520be891b3dda0984837ea78a8b943c97327483621f4c4cba
                                                              • Instruction Fuzzy Hash: EAC1D7B2D042554FF724CB24DE85AEABBB9EB94300F0481FED409AA6D4D3B95FC58E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8$^Q$n$n$x
                                                              • API String ID: 0-2519598271
                                                              • Opcode ID: cb2046acbe303f66547e2c07a6aa3424077591e4f079b1670b2fa05cabce1ead
                                                              • Instruction ID: cef50274677d04160880c6e3a8f26e4c50c77b2a6cf58296d4e1980ebabccb0c
                                                              • Opcode Fuzzy Hash: cb2046acbe303f66547e2c07a6aa3424077591e4f079b1670b2fa05cabce1ead
                                                              • Instruction Fuzzy Hash: A59127B3C011654FF728CA24DE85AEABBB9EB90304F0481BED409AA5D4D3B95FC58E51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8$^Q$n$n$x
                                                              • API String ID: 0-2519598271
                                                              • Opcode ID: ece87ebeb5a04feba06d3f0cad7a080e1b91bd00ec6186574ccb723f5d0c4e1d
                                                              • Instruction ID: aa1390978b0d68ebc0a167fbc875ae1391f3f3e707e62369f414e39408b0bae4
                                                              • Opcode Fuzzy Hash: ece87ebeb5a04feba06d3f0cad7a080e1b91bd00ec6186574ccb723f5d0c4e1d
                                                              • Instruction Fuzzy Hash: 587119B2C011654FF728CB24DE89AEABBB9EB80304F0481FED4096A5D4D3795FC58E42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8$^Q$n$n$x
                                                              • API String ID: 0-2519598271
                                                              • Opcode ID: f9bed76a7f18ec2d0f4b68e9c159614398ac11c0216a5bb5d090fdf93c7305de
                                                              • Instruction ID: f9d38d6906b09892c7c9541f92a6af24a3cf46377957d0555673c3edf364d667
                                                              • Opcode Fuzzy Hash: f9bed76a7f18ec2d0f4b68e9c159614398ac11c0216a5bb5d090fdf93c7305de
                                                              • Instruction Fuzzy Hash: DB7109B2C051654FF728CB24DE99AEABBB9EB80304F0481FED4096A5D4D3795FC58E42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8$n$n$x
                                                              • API String ID: 0-2129689772
                                                              • Opcode ID: dbd26719ba5f96f58f6f59ee7a6e958c876c2d5c41b7bf31185cf3e5d0c260c3
                                                              • Instruction ID: 32c7e96a33cb844f7c72c23f0ce5258408d0960b59636f84b296633eb0b46dbb
                                                              • Opcode Fuzzy Hash: dbd26719ba5f96f58f6f59ee7a6e958c876c2d5c41b7bf31185cf3e5d0c260c3
                                                              • Instruction Fuzzy Hash: 1B5127B2C052A44FE728CA24CD497DBBB79EB41304F0581BAD80D6A994D67D5BC9CB82
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: HXWQ$P2?5
                                                              • API String ID: 0-4075685934
                                                              • Opcode ID: fc4e7237633e15f44501297d4546b46f281e2fe4381cbdd60f8535064e24066b
                                                              • Instruction ID: 00225a8dfb1658469d3c25a5a9ee49aa43f26e3814125a48ffc18d2d5ec38e5a
                                                              • Opcode Fuzzy Hash: fc4e7237633e15f44501297d4546b46f281e2fe4381cbdd60f8535064e24066b
                                                              • Instruction Fuzzy Hash: 207128B2C001958FE724CB24CD95AFEBBB5EF85300F1881BED449AB590D2B95BC58E46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetProcessHeap.KERNEL32 ref: 0040C053
                                                              • HeapAlloc.KERNEL32(00000000,00000000,000005B0), ref: 0040C064
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocProcess
                                                              • String ID:
                                                              • API String ID: 1617791916-0
                                                              • Opcode ID: 9baf3c8bfd83b6516b66781d598a04bc8dda0dcc0ac1b73f38a914e68a0faa72
                                                              • Instruction ID: 580f6c0c1b727f915f45420c6b560cbcb7f6e6cafde418b56ce905b5f2e5ce77
                                                              • Opcode Fuzzy Hash: 9baf3c8bfd83b6516b66781d598a04bc8dda0dcc0ac1b73f38a914e68a0faa72
                                                              • Instruction Fuzzy Hash: 90C08C31700B31DADA202BB43C4CACB3A0CEB00A537010021F401F2082C724C801CAFC
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07a6f1c2ef20d4f6ce27562002f73c38644395044acc83ddd4d5b880fc4a2580
                                                              • Instruction ID: fcc7e448ca38139ad586aadad377773fab4e99c0378823521c7317bf70d34349
                                                              • Opcode Fuzzy Hash: 07a6f1c2ef20d4f6ce27562002f73c38644395044acc83ddd4d5b880fc4a2580
                                                              • Instruction Fuzzy Hash: B102AFB1E081299FDB24CB24EC90BEAB7B5EF84314F5481EBD809A6340D6385EC5CF56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(?,?,?,?), ref: 00448422
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID:
                                                              • API String ID: 2299586839-0
                                                              • Opcode ID: 7600aa44a35ec1b1ec456989e0333e23b8edb6ab0473bd002e61e064ac84fbd1
                                                              • Instruction ID: 788031df0fc74cb8050b7ceb17a755f4a65af0da5db70e3e4d61a9992314f5b7
                                                              • Opcode Fuzzy Hash: 7600aa44a35ec1b1ec456989e0333e23b8edb6ab0473bd002e61e064ac84fbd1
                                                              • Instruction Fuzzy Hash: C3C0013600024DBB8F025F82ED4889A3F2AEB88261B048020FA28150228B32D931AB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: D47=
                                                              • API String ID: 0-3728716063
                                                              • Opcode ID: 12f4ec79a3f8aca3222d3a312428db849cba948f89ed9743aa5dc19d6d68997d
                                                              • Instruction ID: 1d76649bc7a4eedaa303eb2ebb4ec75060f8daf90673a2d31d8653e2b13d72e0
                                                              • Opcode Fuzzy Hash: 12f4ec79a3f8aca3222d3a312428db849cba948f89ed9743aa5dc19d6d68997d
                                                              • Instruction Fuzzy Hash: 4781A2B1D142398AE7648B24DC90BFAB675EF54300F1081FAD54DA7290EA3D5EC1CF65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: P2?5
                                                              • API String ID: 0-3284864863
                                                              • Opcode ID: 829558128b5e2f9f7e7c139cf5c7ed05b15b1e5de2f9f92214fbbd2df816a882
                                                              • Instruction ID: d978e1048c22fb4af2e126148ab62ef580d4daf8699681b28240bb30ef0bec2e
                                                              • Opcode Fuzzy Hash: 829558128b5e2f9f7e7c139cf5c7ed05b15b1e5de2f9f92214fbbd2df816a882
                                                              • Instruction Fuzzy Hash: 757118B2C101958FE724CB24CD95AFEBBB5EF85300F1881BED409AB5D0D2B95BC58E46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: P2?5
                                                              • API String ID: 0-3284864863
                                                              • Opcode ID: b915629ecf9636e1a50f322be0bc94144585b37f529017de573fb4f1ba3a95e9
                                                              • Instruction ID: d7fa759c572c41ae5a9a47fb33831c2e64d017be3d60502368ad3ab2668dc4d3
                                                              • Opcode Fuzzy Hash: b915629ecf9636e1a50f322be0bc94144585b37f529017de573fb4f1ba3a95e9
                                                              • Instruction Fuzzy Hash: 48712772C001958FE724CB24CD95AEEBBB5EF85300F1881FED409AB590D2B95AC58E46
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: :?L:
                                                              • API String ID: 0-187022543
                                                              • Opcode ID: ab9e5a3dbf33d407fb6aeacbee6a3dec57d1528f271c3e041b634375bf3472c0
                                                              • Instruction ID: c7a37152abdf742581403c0fed52af81b946c038d54bbd33830aa8dee06f9e65
                                                              • Opcode Fuzzy Hash: ab9e5a3dbf33d407fb6aeacbee6a3dec57d1528f271c3e041b634375bf3472c0
                                                              • Instruction Fuzzy Hash: B65137B3D001545FE728CA25DD85AEEBB79EBC1310F1481FED40D66A90D3BD5AC68E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: P2?5
                                                              • API String ID: 0-3284864863
                                                              • Opcode ID: ea1d6309b43dc57db74b100131581c403552c1912820ce9fb7c1ce457adfef00
                                                              • Instruction ID: bcfe43b3626583e74cabbc67fbcc7409420889c2ed51074537a3fcdd0edb5e9a
                                                              • Opcode Fuzzy Hash: ea1d6309b43dc57db74b100131581c403552c1912820ce9fb7c1ce457adfef00
                                                              • Instruction Fuzzy Hash: 97515BB2C101958FE714CB38CD95AFEBB75EF85304F0881BED445AB5D1D2B85AC58E06
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _vswprintf_s
                                                              • String ID: %s:%I64X
                                                              • API String ID: 677850445-3180616182
                                                              • Opcode ID: 8e2a16c6592a42fff0cfe875e6b527e75f3c85e4fb726ef5102888ea82c67930
                                                              • Instruction ID: e144124d62655bf3eaa731ff4750fd2ef03a2d88ea263d9c490b22e00845112c
                                                              • Opcode Fuzzy Hash: 8e2a16c6592a42fff0cfe875e6b527e75f3c85e4fb726ef5102888ea82c67930
                                                              • Instruction Fuzzy Hash: 02319371E00218ABDB14CF9AD84079EFBF5FF88710F10412BE815B7380DB7899018B94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b439e512d2f2274f2d51447746bdfa11f260257c9624696f8b482fc4d82d582e
                                                              • Instruction ID: 1023cae0511ab3d43fddd3dc3760f17de12005917cf52bd75e7327f2d6d831f6
                                                              • Opcode Fuzzy Hash: b439e512d2f2274f2d51447746bdfa11f260257c9624696f8b482fc4d82d582e
                                                              • Instruction Fuzzy Hash: A612C5BBB983194FDB48CEE5DCC169573E1FB98304F09A43C9A55C7306F6E8AA094790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bca380f85856fe320bc0c99413256e9a87045c9cba0339ac54d5e2416315925d
                                                              • Instruction ID: 6ccaf752b8d8ea78f5d8c848e62c60230c57617c2eb0205f1da4eb24dcd9d9b8
                                                              • Opcode Fuzzy Hash: bca380f85856fe320bc0c99413256e9a87045c9cba0339ac54d5e2416315925d
                                                              • Instruction Fuzzy Hash: ECF17DB1E092298FEB24CB24DC94AEAB7B5FB85304F1081EAD80DA6345D6395EC1CF45
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a25cdedaa1eafb390bb43f5ac0b99185bf52ccf65a89beac1da3fcd980ce4a81
                                                              • Instruction ID: a1ecc45f5541d17e686db2fe260ee0f6aba9e1fb8fa2837946db24dff4fc283e
                                                              • Opcode Fuzzy Hash: a25cdedaa1eafb390bb43f5ac0b99185bf52ccf65a89beac1da3fcd980ce4a81
                                                              • Instruction Fuzzy Hash: 8F9107B2D441564FE728CA24DE89BEEBB79EB81300F0542FED80D56AD0D6B85AC58E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 32200371e365bdf780d40601757575adfb2c0b17e9d44f4cad7bcc73103b22e0
                                                              • Instruction ID: 9facc0af94ad3b89fb1a6259fb7b993d5c404603322f4cb0fe9e19772579d3ce
                                                              • Opcode Fuzzy Hash: 32200371e365bdf780d40601757575adfb2c0b17e9d44f4cad7bcc73103b22e0
                                                              • Instruction Fuzzy Hash: A99107B2D441564FE728CA24DE89BEFBB79EB81300F0542FED80D966D0D7B85AC58E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4a12ad7fd0b2c840adc6a9e2812a0664ab822cad9516781af9bb26c13e69be3e
                                                              • Instruction ID: 2d3dd497658756ff4c609fa0e379f25625354b2e0894d635f1eee9d2857d66d4
                                                              • Opcode Fuzzy Hash: 4a12ad7fd0b2c840adc6a9e2812a0664ab822cad9516781af9bb26c13e69be3e
                                                              • Instruction Fuzzy Hash: E8911A72D441658FEB28CE24CD89BEEBB75EB91300F0442FED40D965E0D7B85AC58E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f9de43bcdd577f89d96464d0dc56b912104fbc602b73b41ebb3f0fd9d0d89e40
                                                              • Instruction ID: baef11cc9e716af9a59e2fb239929fc56db5f58b12b87809a99c96b5b2fc43ea
                                                              • Opcode Fuzzy Hash: f9de43bcdd577f89d96464d0dc56b912104fbc602b73b41ebb3f0fd9d0d89e40
                                                              • Instruction Fuzzy Hash: F77104B2D4411A4FE728CA14DD9ABFAB778EB41304F0441FED40E96A90D7BC6EC58E02
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 27852bd5941f34932c5d7a261fc2b6e0785adce53a3e9f09d3654e8489cb5c47
                                                              • Instruction ID: 75d4878b59c995a76098997b89a25319a9a441f62bff6acdc282fa48d20fa7ff
                                                              • Opcode Fuzzy Hash: 27852bd5941f34932c5d7a261fc2b6e0785adce53a3e9f09d3654e8489cb5c47
                                                              • Instruction Fuzzy Hash: 4C8105B2D0021A9FE738CA14DD85BFAB779EB85304F0441FAD40DA6A90D7796EC5CE42
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0b95772fe7a971707e5bd1bcec9bf7c8c5169b9cdc2160e17cb6a6e178bb12a4
                                                              • Instruction ID: 5582b0c30218d3769de837e9b797b84d4e6f714c3b7469f4d9cf7e5db4cfc39d
                                                              • Opcode Fuzzy Hash: 0b95772fe7a971707e5bd1bcec9bf7c8c5169b9cdc2160e17cb6a6e178bb12a4
                                                              • Instruction Fuzzy Hash: BE712BB2D441558FE728CA24DE89BEEBB79EB81300F0542FED80D566D0D7B85EC58E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c19977903c5e65d9fb8812f0de9257bb7a88d8e8b2ae9429cd83349e60d998df
                                                              • Instruction ID: 8b81bda9b8fab892b258e4d6a89dc2dc3055979a3a08e658ae98d0d53afadfae
                                                              • Opcode Fuzzy Hash: c19977903c5e65d9fb8812f0de9257bb7a88d8e8b2ae9429cd83349e60d998df
                                                              • Instruction Fuzzy Hash: C0711BB2D441554FEB28CA24DD89BEEBB79EB81300F0542FED80D566E0D7B85EC18E41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 14b7681f794f2b859e931b6657aa8847074b694a325a985d2fb16c3b18a4c012
                                                              • Instruction ID: 2dc78392055df211ea779bd536bb5e45a1508b8059c4953ae852931a4689ae83
                                                              • Opcode Fuzzy Hash: 14b7681f794f2b859e931b6657aa8847074b694a325a985d2fb16c3b18a4c012
                                                              • Instruction Fuzzy Hash: B071EEB2D142649BEB248B24EC45BEA7775EF44300F1081EEC88EA7281D77C5EC68F95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3a14b438bf0ba4c90f57067d81787960cb90cc1d62abccabb82ad91f90ae1c24
                                                              • Instruction ID: 5f45bc051415e163a5c49b6ecb86a20f3ef97ee9ee7b062dab956de84034c9ba
                                                              • Opcode Fuzzy Hash: 3a14b438bf0ba4c90f57067d81787960cb90cc1d62abccabb82ad91f90ae1c24
                                                              • Instruction Fuzzy Hash: 987181B1E4012BDBE7248B10ED80BFA7375EB94314F1481FAD90996740E63D4ED29E5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d6cf9bf798da41a0aadd049484754773535c6285bb584e2e0a7867b1c93dbdd2
                                                              • Instruction ID: c60990d571fcd7b116c92b0716adbbfc50c2c0b6a86323ef44199df878ed642d
                                                              • Opcode Fuzzy Hash: d6cf9bf798da41a0aadd049484754773535c6285bb584e2e0a7867b1c93dbdd2
                                                              • Instruction Fuzzy Hash: CE71995410DBE29BC316CF3948D02A8FFE1AE67101708875ED8E647B86C668E1A5DBF1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d37d793a2ac866280ea10549ac07497e5442353c9ff9541e8fe59a2d101c6ba3
                                                              • Instruction ID: 87f5f4c7b4747d40eb58a693aee0eedec05ec3f6ae5d79e4baa621dc0bc649f2
                                                              • Opcode Fuzzy Hash: d37d793a2ac866280ea10549ac07497e5442353c9ff9541e8fe59a2d101c6ba3
                                                              • Instruction Fuzzy Hash: 636116B2D041565FE738DA24CD5ABFABB78EB85304F0441FAD40DD6A90D3786EC68E12
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a479ca6773b4e3ececbe5587a715473e9244aabb2c8f1c025aefcb5262441758
                                                              • Instruction ID: abf781aea15bb2ebf8719a2540621a91c786f6a1666d5b11ea0e5f7e3822d84b
                                                              • Opcode Fuzzy Hash: a479ca6773b4e3ececbe5587a715473e9244aabb2c8f1c025aefcb5262441758
                                                              • Instruction Fuzzy Hash: FA61BE71E022798AEB608B25DC547EEB772EF54301F4040FAD80DA7690EA795EC1CF69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26f3af31fb63ed0eb6add7f6965b9f21c50ab02195a74bd547025cfbd45a3288
                                                              • Instruction ID: 393e0e4ff5da66cccfaf8bad3a1d10d57fa0603b28a7b8e271ddb612df54d811
                                                              • Opcode Fuzzy Hash: 26f3af31fb63ed0eb6add7f6965b9f21c50ab02195a74bd547025cfbd45a3288
                                                              • Instruction Fuzzy Hash: 6061BE72E062698AE760CB25DC54BEEB775EF54300F0080FAD90DA7680EA395EC5CF56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f3aee1877f2fcf241037364b6e71e7a732ed294a0964b6b06372c4e956ffd973
                                                              • Instruction ID: ba3aea8688de00197c3961e4e649cdcdc1991a10523b383ba4ecc5571cfa838b
                                                              • Opcode Fuzzy Hash: f3aee1877f2fcf241037364b6e71e7a732ed294a0964b6b06372c4e956ffd973
                                                              • Instruction Fuzzy Hash: D3615B725087118FC318DF49D48494AF3E1FFC8328F1A8A6DE9885B361D771E959CB86
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 380b40b5d6052808e6ceda2128ecf0b24c9b9798fac34f204029c9ebe14efa24
                                                              • Instruction ID: 3bb65e678d37e689efbe7f995991ac506105481fc4004b9e366a4404860f827b
                                                              • Opcode Fuzzy Hash: 380b40b5d6052808e6ceda2128ecf0b24c9b9798fac34f204029c9ebe14efa24
                                                              • Instruction Fuzzy Hash: A95135B2D042565FE728DA24CD5ABFABB78EB81304F0041FAD40D96A90D3785EC68E12
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: operator+$NameName::$Decorator::getName::operator+$ThisType$Name::operator|=Scope
                                                              • String ID: QD$QD
                                                              • API String ID: 398566123-1550548732
                                                              • Opcode ID: 794240fa5a1516c6d0e2d9c5d7a373a49819a2d09ceaf47e05691be9d527f491
                                                              • Instruction ID: d1b7e0adb0a3f196e2e037ff9ed62cdcf100d09a33e416e05376dfa50685d5fa
                                                              • Opcode Fuzzy Hash: 794240fa5a1516c6d0e2d9c5d7a373a49819a2d09ceaf47e05691be9d527f491
                                                              • Instruction Fuzzy Hash: DFB197B2900608AFEB10DF94C882EEE7BB8EF05305F15406FF505A7291DB79DA44CB5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(0A0B9F7F,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B7C4
                                                              • __snwprintf.LIBCMT ref: 0040B7DB
                                                              • CreateMutexW.KERNEL32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B7F5
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B808
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B818
                                                              • _memset.LIBCMT ref: 0040B834
                                                              • _swscanf.LIBCMT ref: 0040B86B
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B885
                                                              • HeapAlloc.KERNEL32(00000000,00000000,000005C0,?,?,?,?,?,?,?,?,?,?,?,?,0045B14B), ref: 0040B897
                                                              • __CxxThrowException@8.LIBCMT ref: 0040B8D2
                                                              • __swprintf.LIBCMT ref: 0040B8E9
                                                              • __CxxThrowException@8.LIBCMT ref: 0040B910
                                                              • ReleaseMutex.KERNEL32(?,?,00465204), ref: 0040B91E
                                                              • CloseHandle.KERNEL32(?), ref: 0040B940
                                                              • ReleaseMutex.KERNEL32(00000000), ref: 0040B963
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040B96E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Mutex$CloseException@8HandleHeapProcessReleaseThrow$AllocCreateCurrentErrorLastObjectSingleWait__snwprintf__swprintf_memset_swscanf
                                                              • String ID: %s %u$1830B7BD-F7A3-4c4d-989B-C004DE465EDE
                                                              • API String ID: 2967953817-332789905
                                                              • Opcode ID: 21630a82ff95050d2a936fc027293757e53b3bd1dc2a9272b0684d330f7f6356
                                                              • Instruction ID: b0080335ab30dc4e6b4e05c12cebb1b1aa067a19cdad22adf5ef2cdec4d22371
                                                              • Opcode Fuzzy Hash: 21630a82ff95050d2a936fc027293757e53b3bd1dc2a9272b0684d330f7f6356
                                                              • Instruction Fuzzy Hash: 145182B1900744ABDB10EFA4DD45BAE77A8EB14714F10423AF905E72D1EBB855048B9E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00406424
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,00000000,?,?,?,?,004060DB,00000000,00002000,00000000,00401596,?,?,?,00401C5E,?), ref: 00406434
                                                                • Part of subcall function 0042F2AE: __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0042F2AE: ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                                • Part of subcall function 0042F2AE: ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                                • Part of subcall function 0042F2AE: HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                                • Part of subcall function 0042F2AE: GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards,00000000,00020119,?,00000000,?,?,?,?,004060DB,00000000,00002000,00000000,00401596,?), ref: 0040645A
                                                              • RegEnumKeyExW.ADVAPI32 ref: 00406486
                                                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020119,?), ref: 004064AB
                                                              • RegQueryValueExA.ADVAPI32(?,ServiceName,00000000,?,00000004,?), ref: 004064DF
                                                              • RegCloseKey.ADVAPI32(?), ref: 0040650D
                                                              • RegEnumKeyExW.ADVAPI32(00000000,00000001,00000000,?,00000000,00000000,00000000,00000000), ref: 00406530
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040653F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseEnumErrorHeapLastOpen$AllocFreeQueryValue___sbh_find_block___sbh_free_block__lock_malloc
                                                              • String ID: %012I64X$MAC:$SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards$ServiceName
                                                              • API String ID: 3177717327-1531755283
                                                              • Opcode ID: e5e2b6cb0406eebcd3ecfd1ca0ec33acc8a31c79426b9c3f7b5b7b2d670d5707
                                                              • Instruction ID: 91a01f5ca6e93bf5eebee49e75ff8b246a23b9fedb22c95eae37365d202e933b
                                                              • Opcode Fuzzy Hash: e5e2b6cb0406eebcd3ecfd1ca0ec33acc8a31c79426b9c3f7b5b7b2d670d5707
                                                              • Instruction Fuzzy Hash: 6841B171204300BBE620DF95EC85F1BBBE8EFC4B59F40052EF945A22C5E678D908876A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 00408F32
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000), ref: 00408F50
                                                              • _vswprintf_s.LIBCMT ref: 00408FD4
                                                              • _wcsrchr.LIBCMT ref: 00409015
                                                              • __snwprintf.LIBCMT ref: 0040903B
                                                              • __CxxThrowException@8.LIBCMT ref: 00409081
                                                              • GetLastError.KERNEL32(?,004651D0), ref: 00409094
                                                              • SetLastError.KERNEL32(00000000), ref: 004090B2
                                                              • __CxxThrowException@8.LIBCMT ref: 004090D5
                                                              • __CxxThrowException@8.LIBCMT ref: 004090EB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$Exception@8Throw$__getptd_noexit__snwprintf_vswprintf_s_wcsrchr
                                                              • String ID: 4-F$<%s:%d>
                                                              • API String ID: 1135991162-2115238217
                                                              • Opcode ID: 8da0d668e8d2bed21a38bc542d697908a3f4a170cb8d83eb15cc4d257e8be0b2
                                                              • Instruction ID: 14e59de21d721aaef6b68cd87fe21ec90b452582bd65d8ba9509ecaee94afa43
                                                              • Opcode Fuzzy Hash: 8da0d668e8d2bed21a38bc542d697908a3f4a170cb8d83eb15cc4d257e8be0b2
                                                              • Instruction Fuzzy Hash: AB51C1715003019BC720EF29CC85BAB76E9EF89710F05493EF94597296EBB8DD04C7A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\360MachineSignature,00000000,00020119,?,00000000,?,00000000,?,?,?,00401C5E,?,?), ref: 00401666
                                                              • RegQueryValueExW.ADVAPI32(?,Operator,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 004016AD
                                                              • RegQueryValueExW.ADVAPI32(?,IssueDate,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 004016F4
                                                              • RegQueryValueExW.ADVAPI32(?,ExpirationDate,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 00401733
                                                              • RegQueryValueExW.ADVAPI32(?,SignData,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 0040176A
                                                              • RegCloseKey.ADVAPI32(?), ref: 004017A8
                                                              • RegCloseKey.ADVAPI32(?,?,00000000,?,?,?,00401C5E,?,?), ref: 004017C1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: QueryValue$Close$Open
                                                              • String ID: ExpirationDate$IssueDate$Operator$SOFTWARE\360MachineSignature$SignData
                                                              • API String ID: 2895014784-1479031278
                                                              • Opcode ID: 2d54e4a1bd58c59d3d4e4eac94afafb44d7a5f605dbedefef143314ab1df9f72
                                                              • Instruction ID: 1f7021fa9f236602036fbd2601c454c1c7a1e4c58a50fa6465acc4d7145fd61b
                                                              • Opcode Fuzzy Hash: 2d54e4a1bd58c59d3d4e4eac94afafb44d7a5f605dbedefef143314ab1df9f72
                                                              • Instruction Fuzzy Hash: AA5130B16043029FC320CF69DC80A6BB7E8EBD4754F444A2EF595E3350E774E9098B5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __getptd
                                                              • String ID: MOC$csm$csm
                                                              • API String ID: 3384420010-2232927589
                                                              • Opcode ID: 392d5472d71fa33a46a6336c1c2ef07575f60051be97fb51371ea02d882e00af
                                                              • Instruction ID: e8da79c3ca801231d8ecad43d2117962de43db7f41a6095863ddad8b9e0fae0f
                                                              • Opcode Fuzzy Hash: 392d5472d71fa33a46a6336c1c2ef07575f60051be97fb51371ea02d882e00af
                                                              • Instruction Fuzzy Hash: 1B31AC71400604DFDB308E59C482B6A73A8FB18319F58692BDA86C7352DB78E9458BDB
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?,?,?,?,00000000,00000002,00401D80,?,?,?,?,?,?,?,?), ref: 00404709
                                                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?), ref: 0040479C
                                                              • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,?), ref: 004047B8
                                                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?), ref: 00404844
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Pointer$ReadSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 1971422761-3013408749
                                                              • Opcode ID: 1d27160b763ea9f39c40ede33503e64cfab6d797d1ed3998228b8f098f8d92e9
                                                              • Instruction ID: 03dfb4d2336c3ded1a3879e9d3a15ab1a4d94976a0d75a54ec2001c5ebdae41d
                                                              • Opcode Fuzzy Hash: 1d27160b763ea9f39c40ede33503e64cfab6d797d1ed3998228b8f098f8d92e9
                                                              • Instruction Fuzzy Hash: 597114B6B443016BD210EA25DD81F2B7395EBC4B15F14493EFA44A73C0EA7DEC0587A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • 1830B7BD-F7A3-4c4d-989B-C004DE465EDE, xrefs: 0040B6A5
                                                              • %s-%d-%s:, xrefs: 0040B6B0
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B6AB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Atom_memset$CurrentDeleteFindProcess__vswprintf_s_lswprintf
                                                              • String ID: %s-%d-%s:$1830B7BD-F7A3-4c4d-989B-C004DE465EDE${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 389091746-1980942712
                                                              • Opcode ID: 437e8d90748bc7b6513a2a46a6f3fe04147eb6367c4c28063d2286c0b8bc6247
                                                              • Instruction ID: 2e7dcfaec5885a51cec920f46e6640d5eddf5b0521efb3552e3d683f1a8d1c5a
                                                              • Opcode Fuzzy Hash: 437e8d90748bc7b6513a2a46a6f3fe04147eb6367c4c28063d2286c0b8bc6247
                                                              • Instruction Fuzzy Hash: 7021F7B1104300ABD314EB64DC96AFBB3A9EFD4700F84453FFA4583191EBB89504879E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • UnDecorator::UScore.LIBCMT ref: 004456A4
                                                              • DName::DName.LIBCMT ref: 004456B0
                                                                • Part of subcall function 004435CF: DName::doPchar.LIBCMT ref: 004435FC
                                                              • DName::DName.LIBCMT ref: 004456DD
                                                                • Part of subcall function 00443203: DNameStatusNode::make.LIBCMT ref: 00443231
                                                              • UnDecorator::getScopedName.LIBCMT ref: 004456EB
                                                              • DName::operator+=.LIBCMT ref: 004456F5
                                                              • DName::operator+=.LIBCMT ref: 00445704
                                                              • DName::operator+=.LIBCMT ref: 00445710
                                                              • DName::operator+=.LIBCMT ref: 0044571D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: NameName::operator+=$Name::$Decorator::Decorator::getName::doNode::makePcharScopedScoreStatus
                                                              • String ID: void
                                                              • API String ID: 2229739886-3531332078
                                                              • Opcode ID: 5015c3408bcb27d64949bf4dae6a3a8c0bd37e1f0a86d6c0238cc5b9e1a2eb31
                                                              • Instruction ID: eb00b007f5abc369386499d998b18eebabc6c8172c4893b9a245dc17d1844bad
                                                              • Opcode Fuzzy Hash: 5015c3408bcb27d64949bf4dae6a3a8c0bd37e1f0a86d6c0238cc5b9e1a2eb31
                                                              • Instruction Fuzzy Hash: F2118670900504ABEB08EF64C886AAD7B64AB40709F40405BF006A72D2EBB8AA45CB49
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __fileno$__cftof__getbuf__wctomb_s_l
                                                              • String ID:
                                                              • API String ID: 1564009976-0
                                                              • Opcode ID: 8f5f60656d8aee7740e73f9f92f01c785faa6956bd2cc472c8204fa9af18c4d8
                                                              • Instruction ID: 83c87296a530c54ed5d9dc8e46f76a92cbeb1989d0cf7a41b3e55cd3b412d914
                                                              • Opcode Fuzzy Hash: 8f5f60656d8aee7740e73f9f92f01c785faa6956bd2cc472c8204fa9af18c4d8
                                                              • Instruction Fuzzy Hash: E45133325006059FCB349F29C940A6B73E0AF56329F14852FE8A6D73C2D7B8ED49CB49
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __calloc_crt.LIBCMT ref: 00437866
                                                                • Part of subcall function 004356D3: __calloc_impl.LIBCMT ref: 004356E4
                                                                • Part of subcall function 004356D3: Sleep.KERNEL32(00000000,?,?,00002000), ref: 004356FB
                                                              • __calloc_crt.LIBCMT ref: 0043788A
                                                              • __calloc_crt.LIBCMT ref: 004378A6
                                                              • __copytlocinfo_nolock.LIBCMT ref: 004378CB
                                                              • __setlocale_nolock.LIBCMT ref: 004378D8
                                                              • ___removelocaleref.LIBCMT ref: 004378E4
                                                              • ___freetlocinfo.LIBCMT ref: 004378EB
                                                              • __setmbcp_nolock.LIBCMT ref: 00437903
                                                              • ___removelocaleref.LIBCMT ref: 00437918
                                                              • ___freetlocinfo.LIBCMT ref: 0043791F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __calloc_crt$___freetlocinfo___removelocaleref$Sleep__calloc_impl__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
                                                              • String ID:
                                                              • API String ID: 2969281212-0
                                                              • Opcode ID: cca770cd89a3457768f8d1dee5c51a7bb805c9547a9ab6f93a5d569ae38ab5d2
                                                              • Instruction ID: 0bda3ca86f29450c0e7a3ef308c41bbb666b0ae9fb036e98977096b7d3cefda8
                                                              • Opcode Fuzzy Hash: cca770cd89a3457768f8d1dee5c51a7bb805c9547a9ab6f93a5d569ae38ab5d2
                                                              • Instruction Fuzzy Hash: 12210675208A01EBE7357F27D806A0A7BE0DF8D364F61943FF4C556261DE399801C65D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,00405C4F,?,00000000,?), ref: 004049FC
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,00405C4F,?,00000000,?), ref: 00404A9C
                                                              • ReadFile.KERNEL32(?,?,00008000,?,00000000,?,?,?,?,?,00405C4F,?,00000000,?), ref: 00404AB8
                                                              • _memset.LIBCMT ref: 00404B63
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$PointerReadSize_memset
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 1834740430-3013408749
                                                              • Opcode ID: dd4a552fa05887f9568b90e49408ec4a10f34fd83e3cde6fc923f0df16e78341
                                                              • Instruction ID: c7279cdef8b6de9ed2af9f0036a7ef1b0d318f082f7ee79805dd3dc40297ac8b
                                                              • Opcode Fuzzy Hash: dd4a552fa05887f9568b90e49408ec4a10f34fd83e3cde6fc923f0df16e78341
                                                              • Instruction Fuzzy Hash: 816126B17443006BD314DA29DD81B2BB3E0EBC8755F04493EF988E3280E77CE9448B8A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?), ref: 004039C5
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403A7F
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403AA9
                                                              • SetEndOfFile.KERNEL32(?), ref: 00403AE9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Pointer$Size
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$SetEndOfFile()$SetFilePointerEx()
                                                              • API String ID: 408439848-1520550917
                                                              • Opcode ID: efe5ed57b227063c12dfbf8f0175d8ac109c7d29c0f11d32ce57c5971a172218
                                                              • Instruction ID: 1b605d734e155b873fdfd4f28f3e3ae818b90f9930aa0250b92f2f22e38c86b6
                                                              • Opcode Fuzzy Hash: efe5ed57b227063c12dfbf8f0175d8ac109c7d29c0f11d32ce57c5971a172218
                                                              • Instruction Fuzzy Hash: 3641B4317043015BD710DE659D81B2B7BD8AB88B4AF04093FF584B72C1E6BCEA058A9E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?), ref: 004037D1
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 0040386C
                                                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0040388C
                                                              • SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000000), ref: 004038B3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Pointer$ReadSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 1971422761-3013408749
                                                              • Opcode ID: d80dedbebb2793100ef8afd5d2585e2e953f73e2ae1894905a99123231bb69ca
                                                              • Instruction ID: bd2c35f2d9b3925e1a7ba6d6698aa27c55923003429fdbcc139eee9cb6e742a9
                                                              • Opcode Fuzzy Hash: d80dedbebb2793100ef8afd5d2585e2e953f73e2ae1894905a99123231bb69ca
                                                              • Instruction Fuzzy Hash: 2A41E3727043016BD710EE29DD81F2BBBD9BBC4B12F14493EF990A62C1D6B8DA04875A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0040B391
                                                              • _memset.LIBCMT ref: 0040B3AE
                                                              • GetCurrentProcessId.KERNEL32 ref: 0040B3B6
                                                              • swprintf.LIBCMT ref: 0040B3D6
                                                                • Part of subcall function 00432B41: __vswprintf_s_l.LIBCMT ref: 00432B55
                                                              • GetAtomNameW.KERNEL32(0000C000,?,00000104), ref: 0040B41E
                                                              Strings
                                                              • 1830B7BD-F7A3-4c4d-989B-C004DE465EDE, xrefs: 0040B3BC
                                                              • %s-%d-%s:, xrefs: 0040B3C7
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B3C2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _memset$AtomCurrentNameProcess__vswprintf_s_lswprintf
                                                              • String ID: %s-%d-%s:$1830B7BD-F7A3-4c4d-989B-C004DE465EDE${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 1762070210-1980942712
                                                              • Opcode ID: 04201b845daf679fd702f084c1f8ee3b84df7fdc10a14036f8850c1365b6ed34
                                                              • Instruction ID: d3ba892406a69276a2d9f1b618fdd1f673d4abaf0ab7cd1099eba7940fe984af
                                                              • Opcode Fuzzy Hash: 04201b845daf679fd702f084c1f8ee3b84df7fdc10a14036f8850c1365b6ed34
                                                              • Instruction Fuzzy Hash: 263189B16043006BD210EB68DC85EABB3E8EF98704F40493FF94593192E775A904879A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 00409195
                                                              • GetLocalTime.KERNEL32(?), ref: 004091A2
                                                              • __swprintf.LIBCMT ref: 004091C5
                                                              • _vswprintf_s.LIBCMT ref: 004091FD
                                                              • OutputDebugStringW.KERNEL32(?), ref: 00409218
                                                              • OutputDebugStringW.KERNEL32(00462D84), ref: 0040921F
                                                              • OutputDebugStringW.KERNEL32(?), ref: 00409246
                                                              Strings
                                                              • <%08X> %02hu:%02hu:%02hu: , xrefs: 004091BF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DebugOutputString$CurrentLocalThreadTime__swprintf_vswprintf_s
                                                              • String ID: <%08X> %02hu:%02hu:%02hu:
                                                              • API String ID: 2086888202-2163415560
                                                              • Opcode ID: 13ecc129a4f9194a9cc056268f5a874c4d06aae9f71d9bff6946beeb61dacec8
                                                              • Instruction ID: 8e58f0009974f807aa0a88d16c54b8bf9c07752b702b58f5e1e4d755a66998c4
                                                              • Opcode Fuzzy Hash: 13ecc129a4f9194a9cc056268f5a874c4d06aae9f71d9bff6946beeb61dacec8
                                                              • Instruction Fuzzy Hash: 8721C371504311AFD728EB64DD89AFF73E4EFD8700F804A5EF88986191EA789904C797
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindWindowW.USER32(Q360AdvToolExecutorWndClass,360AdvToolExecutor), ref: 0042E263
                                                              • _memset.LIBCMT ref: 0042E28E
                                                              • GetCommandLineW.KERNEL32 ref: 0042E2A0
                                                              • IsWindow.USER32(00000000), ref: 0042E2E8
                                                              • SendMessageTimeoutW.USER32(00000000,0000004A,00000000,00000064,00000001,000007D0,00000000), ref: 0042E319
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Window$CommandFindLineMessageSendTimeout_memset
                                                              • String ID: 360AdvToolExecutor$Q360AdvToolExecutorWndClass$d
                                                              • API String ID: 1428618593-896946901
                                                              • Opcode ID: f952c6319ded637e8a2be25a1d5eb67e1dd8c4e37a3a0c622363d516aaf7f046
                                                              • Instruction ID: be255b2814a9b3d3b0f80194d172021b69f52db360a7e57986c6838927bbd2eb
                                                              • Opcode Fuzzy Hash: f952c6319ded637e8a2be25a1d5eb67e1dd8c4e37a3a0c622363d516aaf7f046
                                                              • Instruction Fuzzy Hash: CF216DB0A403189FDB10DF60DC45B99B7F8BF08705F50C5E9A549A6281DFB4AA88CFD9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __fileno$__getbuf
                                                              • String ID:
                                                              • API String ID: 3695372198-0
                                                              • Opcode ID: c173f9ec17edaa17f6ee4bf5f7f1f9aa3a8cbada4bbe69cdd912e2c5fecacc7a
                                                              • Instruction ID: 6b936e4868124953b0f543ace5912ab53509dea9887a6f8d0f4e089e0e30c8cc
                                                              • Opcode Fuzzy Hash: c173f9ec17edaa17f6ee4bf5f7f1f9aa3a8cbada4bbe69cdd912e2c5fecacc7a
                                                              • Instruction Fuzzy Hash: 334136325006448BC734AB29D940A6B7390AF57329F24456FEC66D73C2D7BCEE4A874D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?), ref: 0040532D
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040536F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileSizeUnothrow_t@std@@@__ehfuncinfo$??2@
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$SetFilePointerEx()
                                                              • API String ID: 1756747699-2561355867
                                                              • Opcode ID: 045e6cca237012a5d873fd085605a78d8d810dd21c2544b345ca439df9fc10a8
                                                              • Instruction ID: bf7b32a8e1ee1daeb80faca7c9eea0b1b867eadaca1b8f7f38da0fe90859c255
                                                              • Opcode Fuzzy Hash: 045e6cca237012a5d873fd085605a78d8d810dd21c2544b345ca439df9fc10a8
                                                              • Instruction Fuzzy Hash: 1F51E270740B016BE318EF24DC81FA7B3A4FB84714F54453EE908937C1E7B9A8548A99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0040B56E
                                                              • _memset.LIBCMT ref: 0040B58B
                                                              • GetCurrentProcessId.KERNEL32 ref: 0040B593
                                                              • swprintf.LIBCMT ref: 0040B5AF
                                                                • Part of subcall function 00432B41: __vswprintf_s_l.LIBCMT ref: 00432B55
                                                              • GetAtomNameW.KERNEL32(0000C000,?,00000104), ref: 0040B5EE
                                                              Strings
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B59B
                                                              • %s-%d-%s:, xrefs: 0040B5A0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _memset$AtomCurrentNameProcess__vswprintf_s_lswprintf
                                                              • String ID: %s-%d-%s:${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 1762070210-3571227826
                                                              • Opcode ID: 82fb826cdcdc4336f7a5b576b1eafced99041a18518562a134d50a0958fb8c3e
                                                              • Instruction ID: cbba3bbbb2408f3d45a6993105ac790f0c08af2375fe902b13238ad858c14082
                                                              • Opcode Fuzzy Hash: 82fb826cdcdc4336f7a5b576b1eafced99041a18518562a134d50a0958fb8c3e
                                                              • Instruction Fuzzy Hash: 4121A9726043046BD320EB54DC85AFBB398DF84714F44493EFA4597181EA79A90487DE
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0040B4C9
                                                              • GetCurrentProcessId.KERNEL32 ref: 0040B4D1
                                                              • swprintf.LIBCMT ref: 0040B4F2
                                                                • Part of subcall function 00432B41: __vswprintf_s_l.LIBCMT ref: 00432B55
                                                              • AddAtomW.KERNEL32(?), ref: 0040B4FF
                                                              Strings
                                                              • 1830B7BD-F7A3-4c4d-989B-C004DE465EDE, xrefs: 0040B4D8
                                                              • %s-%d-%s:%s, xrefs: 0040B4E3
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B4DE
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AtomCurrentProcess__vswprintf_s_l_memsetswprintf
                                                              • String ID: %s-%d-%s:%s$1830B7BD-F7A3-4c4d-989B-C004DE465EDE${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 1330282167-1301288515
                                                              • Opcode ID: 5475c2726ad21a62d9e50e63b03a8a0c46f1695309ac880fdee57f2ad6116d02
                                                              • Instruction ID: 49f90f98050547606b8eda84904ebd6c00acf6bbc8e1d7b343d1764b10b85a19
                                                              • Opcode Fuzzy Hash: 5475c2726ad21a62d9e50e63b03a8a0c46f1695309ac880fdee57f2ad6116d02
                                                              • Instruction Fuzzy Hash: 0E0149B16403007BD300EF61DC86ABBB3A8EF94B04F80083BB994C2181FAF8E404479A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,000000CC,?,?,?,?,?,0040519E,?,?), ref: 00404576
                                                              • ReadFile.KERNEL32(?,?,00000008,?,00000000,?,?,?,?,?,0040519E,?,?,00000001,00000000), ref: 00404593
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$PointerRead
                                                              • String ID: .\QHImageHlp.c$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 3154509469-2897820174
                                                              • Opcode ID: 56332d5397ddc3112434a387f4fff7781493f3edbc103fc4514e60ab288b49f8
                                                              • Instruction ID: a7ba87d3e4fafd734ddcf6f3cd13cbc0dee90a629a9315bd97f3778bfee0730c
                                                              • Opcode Fuzzy Hash: 56332d5397ddc3112434a387f4fff7781493f3edbc103fc4514e60ab288b49f8
                                                              • Instruction Fuzzy Hash: 1E4173B0644301ABD610DF11D981A2B73E8EBC9745F404D3FFA85A72C0FBB999058B5B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 0040C159
                                                                • Part of subcall function 0040C4D0: _DebugHeapAllocator.LIBCPMTD ref: 0040C4E0
                                                              • CoInitialize.OLE32(00000000), ref: 0040C19E
                                                                • Part of subcall function 0042E240: FindWindowW.USER32(Q360AdvToolExecutorWndClass,360AdvToolExecutor), ref: 0042E263
                                                                • Part of subcall function 0042E240: _memset.LIBCMT ref: 0042E28E
                                                                • Part of subcall function 0042E240: GetCommandLineW.KERNEL32 ref: 0042E2A0
                                                                • Part of subcall function 0042E240: IsWindow.USER32(00000000), ref: 0042E2E8
                                                                • Part of subcall function 0042E240: SendMessageTimeoutW.USER32(00000000,0000004A,00000000,00000064,00000001,000007D0,00000000), ref: 0042E319
                                                              Strings
                                                              • Q360SafeMutex_Q360AdvToolExecutorMutex, xrefs: 0040C1A7
                                                              • \360Util.dll, xrefs: 0040C15E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Window$AllocatorCommandDebugFindHeapInitializeIterator_baseIterator_base::_LineMessageSendTimeout_memsetstd::_
                                                              • String ID: Q360SafeMutex_Q360AdvToolExecutorMutex$\360Util.dll
                                                              • API String ID: 2683895894-2924836915
                                                              • Opcode ID: d3b5a0732abc0df9c812d955e8ee18da3f166e572647cfff1f4a083dca471343
                                                              • Instruction ID: 2be0485e52df47f87d2654ae8b8a047a1d11b9ef034e44ab1b14c8653dacfca3
                                                              • Opcode Fuzzy Hash: d3b5a0732abc0df9c812d955e8ee18da3f166e572647cfff1f4a083dca471343
                                                              • Instruction Fuzzy Hash: 53410070D10108EBCB04EBE5DC92AED7778AF14308F4045AEE902771D1EF786A09CB69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000000), ref: 00404D95
                                                              • WriteFile.KERNEL32(?,?,00000008,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00404DAE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$PointerWrite
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()$WriteFile()
                                                              • API String ID: 539440098-3552954839
                                                              • Opcode ID: 430e23e13aa7738b3b1f8b4cdc884e8e9eda3a3689b7ea57677f209dda7beab1
                                                              • Instruction ID: 549b3c329b9650cef16aae18e47ccf49b9e830f2323170fbef0b8720ceabb87a
                                                              • Opcode Fuzzy Hash: 430e23e13aa7738b3b1f8b4cdc884e8e9eda3a3689b7ea57677f209dda7beab1
                                                              • Instruction Fuzzy Hash: 2821A5B67007006BE310DA299C82FB77398EBC4711F44483FFA54E22D1F6BDD90986A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(00000005,00000000,?,7622DFA0,004089BF,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 00408BC8
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408BE6
                                                              • _wcschr.LIBCMT ref: 00408C1B
                                                              • _wcschr.LIBCMT ref: 00408C3E
                                                              • __snwprintf.LIBCMT ref: 00408CAD
                                                              Strings
                                                              • %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s, xrefs: 00408C9C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_wcschr$__getptd_noexit__snwprintf
                                                              • String ID: %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s
                                                              • API String ID: 2287154907-1296420124
                                                              • Opcode ID: fee108e2de2b253099acefbf970527ccea13f099144c85f6f397bf0c900a826a
                                                              • Instruction ID: 172b17a69a1951cee07f9fb1351cdc207f06d73bc90140ef39942ad08a7788cd
                                                              • Opcode Fuzzy Hash: fee108e2de2b253099acefbf970527ccea13f099144c85f6f397bf0c900a826a
                                                              • Instruction Fuzzy Hash: 5A21B6B2500714ABD3209B65DD45FB7B3F8EF48741F00842EF98987281EB7CA8008774
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Name::operator+$ArgumentDecorator::getNameName::Typesoperator+
                                                              • String ID: throw(
                                                              • API String ID: 4203687869-3159766648
                                                              • Opcode ID: 65a34e9b409ec9004d59ea8c39782607beeff06af4b3fea58027fa1141fbf606
                                                              • Instruction ID: 428951cbcfe74a0240c373cc1e93f32a0656e90a4d407b596630d3e776d7e093
                                                              • Opcode Fuzzy Hash: 65a34e9b409ec9004d59ea8c39782607beeff06af4b3fea58027fa1141fbf606
                                                              • Instruction Fuzzy Hash: 8B01AC75640208AFDF00EF64DC46FAE37B5EB84709F008057F901AB291D679EA058789
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C,00000000,00000000), ref: 0040BA69
                                                              • __CxxThrowException@8.LIBCMT ref: 0040BA99
                                                              • TlsSetValue.KERNEL32(?,00000000,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C,00000000,00000000), ref: 0040BAAE
                                                              • __CxxThrowException@8.LIBCMT ref: 0040BAC8
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8Throw$ObjectSingleValueWait
                                                              • String ID:
                                                              • API String ID: 2586364301-0
                                                              • Opcode ID: 16afd0f5b96ec433a7f44ac714009dcb17a785963acd1a11252a5c6dbd44d47e
                                                              • Instruction ID: 82b94f8ae3ea0c74fc68bf355bcced71143dc14b0de1f656a462604ca47169f4
                                                              • Opcode Fuzzy Hash: 16afd0f5b96ec433a7f44ac714009dcb17a785963acd1a11252a5c6dbd44d47e
                                                              • Instruction Fuzzy Hash: 50317271B046049BCB10DB699984A6FB7B4EB44724F20466AE415F33D1E7799D008FD9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 004029F3
                                                              • _malloc.LIBCMT ref: 00402AF5
                                                              • SetLastError.KERNEL32(00000008,00002000), ref: 00402B05
                                                                • Part of subcall function 004050D0: _malloc.LIBCMT ref: 004050DC
                                                                • Part of subcall function 004050D0: SetLastError.KERNEL32(00000008,?,00402A5E,?,00002000), ref: 004050EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_malloc$_memset
                                                              • String ID: .\QHCheckCertificate.c$`"F
                                                              • API String ID: 1834304950-2309566295
                                                              • Opcode ID: 7ed07e5735caa85ddfcceed7d1779d4573f8b94b652b00a3a12b9954510cbd8c
                                                              • Instruction ID: 921698dc5f8c579624ca89809a31f904028b7c0024d22f220bc3dc5a3c6b6cd7
                                                              • Opcode Fuzzy Hash: 7ed07e5735caa85ddfcceed7d1779d4573f8b94b652b00a3a12b9954510cbd8c
                                                              • Instruction Fuzzy Hash: 5BB16AB19083019BE720DF25C58875BB7E4AF84344F04493EF899A62D1E7B8E949CB97
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 0040243D
                                                              • SetLastError.KERNEL32(00000008), ref: 0040244D
                                                                • Part of subcall function 00404EF0: _malloc.LIBCMT ref: 00404EFC
                                                                • Part of subcall function 00404EF0: SetLastError.KERNEL32(00000008,00000003,004023AF,00000000), ref: 00404F0E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_malloc
                                                              • String ID: .\QHCheckCertificate.c$X!F$`"F
                                                              • API String ID: 1018170914-3988528553
                                                              • Opcode ID: ced2b3246bb548433fe6192039cd183e0597671a36ff0efda0a7d5906754ef41
                                                              • Instruction ID: ffef2bb2e26d9b2751a906ac4d56d605a7bea727a65ec4aa2e850bc7b12c3673
                                                              • Opcode Fuzzy Hash: ced2b3246bb548433fe6192039cd183e0597671a36ff0efda0a7d5906754ef41
                                                              • Instruction Fuzzy Hash: 57918CB05083019BD710DF25D95476BB7E4BB88348F04493EF889A73C1E7B9D90ACB9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 0040591B
                                                              • SetLastError.KERNEL32(00000008,?), ref: 0040592D
                                                                • Part of subcall function 004046F0: GetFileSizeEx.KERNEL32(?,?,?,?,?,00000000,00000002,00401D80,?,?,?,?,?,?,?,?), ref: 00404709
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004059B9
                                                              • _memset.LIBCMT ref: 004059CF
                                                                • Part of subcall function 0042F2AE: __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0042F2AE: ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                                • Part of subcall function 0042F2AE: ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                                • Part of subcall function 0042F2AE: HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                                • Part of subcall function 0042F2AE: GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$FileFreeHeapSizeUnothrow_t@std@@@___sbh_find_block___sbh_free_block__ehfuncinfo$??2@__lock_malloc_memset
                                                              • String ID: .\QHImageHlp.c
                                                              • API String ID: 2739003063-3639949391
                                                              • Opcode ID: 53e53731d5dc0c79f27a45eb467555df1d4b9eb4aa099394e6c9ad2dd20175f5
                                                              • Instruction ID: 517ecf2449ff4585e6a4ee02c056efbb873295a583b86914759d382ca83a3ea7
                                                              • Opcode Fuzzy Hash: 53e53731d5dc0c79f27a45eb467555df1d4b9eb4aa099394e6c9ad2dd20175f5
                                                              • Instruction Fuzzy Hash: 405181B1A047059FD310DF26D881A5BF7E4FB88314F44893EE98893341E779E919CB96
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00401BF9
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,?), ref: 00401C0D
                                                              • _malloc.LIBCMT ref: 00401C8F
                                                              • SetLastError.KERNEL32(00000008,?,?,?), ref: 00401CA3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_malloc$AllocHeap
                                                              • String ID: h#F
                                                              • API String ID: 2260188370-2559823950
                                                              • Opcode ID: 726705ae21d8206b44e732c66c3c47d14e3477e3fb47bf417179ed846ee2f9e3
                                                              • Instruction ID: 184c4f878ba588457f840cd7963ecda33a4738cc9467846cf079588f42e61e28
                                                              • Opcode Fuzzy Hash: 726705ae21d8206b44e732c66c3c47d14e3477e3fb47bf417179ed846ee2f9e3
                                                              • Instruction Fuzzy Hash: 1D4192B16043009FD310EF65D88176BB7E4AF84358F44093FF986A7291EA79E9098B57
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00408950: GetLastError.KERNEL32(?,?,?,00408AFA,?,?,00000000,?,00403DA0,00403DA0,.\QHImageHlp.c,000000F9,SetFilePointerEx(),?,00403F3C,00000000), ref: 00408953
                                                                • Part of subcall function 00408950: SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408960
                                                                • Part of subcall function 00408950: SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408999
                                                                • Part of subcall function 00408950: SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004089DA
                                                              • __CxxThrowException@8.LIBCMT ref: 00408A2C
                                                                • Part of subcall function 00430AEE: RaiseException.KERNEL32(?,?,?,00408A31,?,?,?,?,?,00408A31,004651D0,004651D0,?,?,00408AC0,F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h), ref: 00430B30
                                                              • __CxxThrowException@8.LIBCMT ref: 00408A64
                                                              • SetLastError.KERNEL32(00000008,0A0B9F7F,?,?,0046AFB0,0040BC07), ref: 00408A9D
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408AD0
                                                              Strings
                                                              • F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h, xrefs: 00408AAD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$Exception@8Throw$ExceptionRaise
                                                              • String ID: F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h
                                                              • API String ID: 2285286292-3244885242
                                                              • Opcode ID: 81b26aa33b47442ad6151af77df4906e466fb63e331fc59c623991658bfe5acd
                                                              • Instruction ID: 78f608b893dcfaa12b1571cf0af7875c925312e8e6e0c0c1070cb4c6a42332e9
                                                              • Opcode Fuzzy Hash: 81b26aa33b47442ad6151af77df4906e466fb63e331fc59c623991658bfe5acd
                                                              • Instruction Fuzzy Hash: 612171B1908705BFC304EB55DD41F6BB7ECEB88704F50891EB559D2181E7B499048B76
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00002000), ref: 00405680
                                                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?,00002000), ref: 004056DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$PointerSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$SetFilePointerEx()
                                                              • API String ID: 3549600656-2561355867
                                                              • Opcode ID: 002aeee8aa800f027f19e688b6a306bc8dd117ebe09191bab169b82a2e1697c7
                                                              • Instruction ID: 4410d8122ce1d505d7394927de24803af10f6d9e91fe08e3b22825f4f107851b
                                                              • Opcode Fuzzy Hash: 002aeee8aa800f027f19e688b6a306bc8dd117ebe09191bab169b82a2e1697c7
                                                              • Instruction Fuzzy Hash: 8521F5367003055BD710DE6AAC81B17B3D5EBC4756F54083FE948E3381EA7AE8099B69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 004037C0: GetFileSizeEx.KERNEL32(?,?), ref: 004037D1
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403B7D
                                                              • _memset.LIBCMT ref: 00403BC1
                                                              • SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 00403BD8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Pointer$Size_memset
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 1683371807-3914906174
                                                              • Opcode ID: 5a486bb19bd36d66ff325cd2ee65ff1c875d8307be99d6bec348bddb0553e176
                                                              • Instruction ID: f0b076e3bf47f6dd10362d227eaba9b5b1ad37131829524ffb3952f504e23e11
                                                              • Opcode Fuzzy Hash: 5a486bb19bd36d66ff325cd2ee65ff1c875d8307be99d6bec348bddb0553e176
                                                              • Instruction Fuzzy Hash: C011D6727403016BD3209E7AAC45F2B7BDD9BC4B59F05483EB509E32C2E978F9058264
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403A7F
                                                                • Part of subcall function 00403660: ReadFile.KERNEL32(?,?,?,O>@,00000000,?,00403E4F,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 0040366B
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403AA9
                                                                • Part of subcall function 004036C0: WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004036CB
                                                              • SetEndOfFile.KERNEL32(?), ref: 00403AE9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Pointer$ReadWrite
                                                              • String ID: .\QHImageHlp.c$SetEndOfFile()
                                                              • API String ID: 2453416919-4247281097
                                                              • Opcode ID: e68519310e03d1bb457b939415d6ef20be6265009fbd0bc666f42bf69442ea78
                                                              • Instruction ID: 5d0f3968e9851f9b99018475ece1dc7d729d9a4bcc906fb307764f292e235d7a
                                                              • Opcode Fuzzy Hash: e68519310e03d1bb457b939415d6ef20be6265009fbd0bc666f42bf69442ea78
                                                              • Instruction Fuzzy Hash: 48114F317483006BD310DE61DC81F2B77E8BBC8B49F04493DF584E72D1E678EA018A5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402EE9
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402F2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: 2bc59f0d90a408989745d97ca6cca8a47ae2d70541a7406858ea88eb858da6c3
                                                              • Instruction ID: 0d988d63105b4594c576dab5bfcb39c7112a556cb757edef9281528a5c4386ee
                                                              • Opcode Fuzzy Hash: 2bc59f0d90a408989745d97ca6cca8a47ae2d70541a7406858ea88eb858da6c3
                                                              • Instruction Fuzzy Hash: A1F04C727803117BE63866B47D49F8B2294AB84FA6F20063AF646F52C1EDF8D400529D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 004026B4
                                                              • CloseHandle.KERNEL32(00000000), ref: 004026FF
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402709
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 5c2f589d72594a6186557a34d8f9ab2629b2f4204b1ce97046b22886ab6b4dfd
                                                              • Instruction ID: 5e1955fbec3b060e4e2a518d0272971e3ebcf4dc4b7bfd94ca19ef33900dbc19
                                                              • Opcode Fuzzy Hash: 5c2f589d72594a6186557a34d8f9ab2629b2f4204b1ce97046b22886ab6b4dfd
                                                              • Instruction Fuzzy Hash: D8F0E931794711BAEA7433747D8EF9B26855B80F14F100A36FD05B62C1FAFD9881815C
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402734
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040277F
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402789
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 0bf16aa2d3ef532428e59290cc4adf6f004b3245f62f8279228f85975612d61d
                                                              • Instruction ID: f9563fed443bc3ce27cc42163b1b5cd02e9fef1377e61b0ea9412f65184119cf
                                                              • Opcode Fuzzy Hash: 0bf16aa2d3ef532428e59290cc4adf6f004b3245f62f8279228f85975612d61d
                                                              • Instruction Fuzzy Hash: BEF02435B803117AEA302370BD8EF9B26859B80B14F100639FA05B62C1EAFC8841815D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00402883,?), ref: 004028C4
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402910
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040291A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 3d46a497373ff0ad7eed8fa03e9e28bf72ad28d7d9b947b8055b5f28c65ecda9
                                                              • Instruction ID: 375de4f723d5be440e722e00ee92808fc970c294448244241056da5e2b769c1f
                                                              • Opcode Fuzzy Hash: 3d46a497373ff0ad7eed8fa03e9e28bf72ad28d7d9b947b8055b5f28c65ecda9
                                                              • Instruction Fuzzy Hash: F2F02435B80310BAEA202734BD4AB8B26856B80B25F104636F905B62C1E9F89842818D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402DD4
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402E20
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402E2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 466f3db981c29cd9ab0c083d27e948281e14ea849801040089524df0435ad0a5
                                                              • Instruction ID: d6c0eacc6a58afcf47488b7d74c908ad0bdafdd572413e70eb707a3f30383844
                                                              • Opcode Fuzzy Hash: 466f3db981c29cd9ab0c083d27e948281e14ea849801040089524df0435ad0a5
                                                              • Instruction Fuzzy Hash: CBF05031780310BBFA302334BD4EFC726855B80B25F110636F901B52C1F9FC9841818C
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402E54
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402EA0
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402EAA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: c3f94df5d2f6d5abf00dbf80a7ee594fe615d63b672bcb7178dd43aa0c17e214
                                                              • Instruction ID: ff91d42f4f04c0cb6f8a41b4dd40f6b58b4c815e4b6c7e4a66f809b21b469755
                                                              • Opcode Fuzzy Hash: c3f94df5d2f6d5abf00dbf80a7ee594fe615d63b672bcb7178dd43aa0c17e214
                                                              • Instruction Fuzzy Hash: 75F02435B803127BEA302374BD4AB8B26855B80B55F100636F905B62C2EAFC8841819D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040220A), ref: 00402244
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402286
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: 1db1b76687a4e8bb440efb1425c83ca015f779a6c3482fc86869fdcb9be7f4e9
                                                              • Instruction ID: ea553e56fd4a06c38728b9b31d26958a910725e45176fca1fa0d9a5223a05e07
                                                              • Opcode Fuzzy Hash: 1db1b76687a4e8bb440efb1425c83ca015f779a6c3482fc86869fdcb9be7f4e9
                                                              • Instruction Fuzzy Hash: AEF02735784320BBF63433707D4FF8F26855B80F24F100635FA01B51C1E8E8A881404C
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040221A), ref: 004022B4
                                                              • CloseHandle.KERNEL32(00000000), ref: 004022F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: efc07ab93a3e5379a1aafee87a645beb55a5777d45d23b4693688bb81b1a3ec9
                                                              • Instruction ID: 5d39d70a6adc7a977038086a062cd6ab7bed64c32d2e7ad64275184ee054e359
                                                              • Opcode Fuzzy Hash: efc07ab93a3e5379a1aafee87a645beb55a5777d45d23b4693688bb81b1a3ec9
                                                              • Instruction Fuzzy Hash: 23F02731B843117AE6343370BD4AF9B26855B80F54F100635FE01B91C1E8FC9841409D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040289A), ref: 00402944
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402984
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: 23bdb758d88eb6772893afea764e0a844dda7450fbaae3f686122c8a370c2e8a
                                                              • Instruction ID: 0d69e81b708f15c77efef7e4f17722566965c308e96861222ce979ccf1989810
                                                              • Opcode Fuzzy Hash: 23bdb758d88eb6772893afea764e0a844dda7450fbaae3f686122c8a370c2e8a
                                                              • Instruction Fuzzy Hash: 73F05C71B803117BF63063B07D0EF8B2585A740B25F110235FE41F51C1E8E8584181AD
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __getptd.LIBCMT ref: 0043AB1F
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __getptd.LIBCMT ref: 0043AB30
                                                              • __getptd.LIBCMT ref: 0043AB3E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __getptd$__amsg_exit__getptd_noexit
                                                              • String ID: MOC$csm
                                                              • API String ID: 803148776-1389381023
                                                              • Opcode ID: 546a182a6e7d5b12224b1f81106d24650c5b7328c0601bff92d7242a378783a5
                                                              • Instruction ID: 05e78cd1568f14788fbbe09d30b4e391dea899aa562c3f9198f8c26ae00602dc
                                                              • Opcode Fuzzy Hash: 546a182a6e7d5b12224b1f81106d24650c5b7328c0601bff92d7242a378783a5
                                                              • Instruction Fuzzy Hash: E9E04F71110204CFC720AB65C047B297395FB4D318F2620ABEA8DC7322C77CF850954B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __calloc_crt.LIBCMT ref: 0043EFA1
                                                              • GetFileType.KERNEL32(00000040,0042911E,?,?,0042910A,00000000,?,?,?,?,?,?,?,?), ref: 0043F02A
                                                              • GetStdHandle.KERNEL32(-000000F6,0042911E,?,?,0042910A,00000000,?,?,?,?,?,?,?,?), ref: 0043F0B4
                                                              • GetFileType.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0042DBE7,?,00428DD2), ref: 0043F0C6
                                                              • SetHandleCount.KERNEL32 ref: 0043F11E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileHandleType$Count__calloc_crt
                                                              • String ID:
                                                              • API String ID: 3036974029-0
                                                              • Opcode ID: b7d48f13b3387f5b17dfcfb8e45931c626402b9b0608b8c8ddddd08fc6d1c4f6
                                                              • Instruction ID: d13556f11a32f0ffbaa44b49b5a399d0604f6c4d04dba7a1fb5db7e020a721ed
                                                              • Opcode Fuzzy Hash: b7d48f13b3387f5b17dfcfb8e45931c626402b9b0608b8c8ddddd08fc6d1c4f6
                                                              • Instruction Fuzzy Hash: 7E512971D04B518EDB288B38DD4472677B0AB1A334F24577AD4B1972E2D77CD80ACB1A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00408EFA,?,?,00000001,?,004036B0), ref: 004087F1
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000), ref: 0040880F
                                                              • _wcsrchr.LIBCMT ref: 00408880
                                                              • _vswprintf_s.LIBCMT ref: 004088DD
                                                              • GetSystemTime.KERNEL32(00000288), ref: 00408916
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$SystemTime__getptd_noexit_vswprintf_s_wcsrchr
                                                              • String ID:
                                                              • API String ID: 3942181620-0
                                                              • Opcode ID: 3be596fcb2dc188245080ee248d0068dd7f63012560903d31e54436db08ccaf5
                                                              • Instruction ID: a12dfbe8bcb0b0c09f6ff4f14e91d9b616d30136fea910be67afa850a14d1e9c
                                                              • Opcode Fuzzy Hash: 3be596fcb2dc188245080ee248d0068dd7f63012560903d31e54436db08ccaf5
                                                              • Instruction Fuzzy Hash: 1A414C719147018FC720AF75C845667B3E4EF58310F04892EE59AD73A1EB78A804CB6A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0042D680
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000102), ref: 0042D696
                                                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 0042D6A3
                                                              • _memset.LIBCMT ref: 0042D6FE
                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,?,00000000,?), ref: 0042D713
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FilePath_memset$FolderModuleNameRemoveSpecSpecial
                                                              • String ID:
                                                              • API String ID: 359805494-0
                                                              • Opcode ID: 7ffac12201360a27492ef9a8c6e46d6ba8d65e8f74295bea7cd19c9cd888329f
                                                              • Instruction ID: d0c4d087bca0709b8c827d22c595415c302136f733cf5c869673d8418bc65854
                                                              • Opcode Fuzzy Hash: 7ffac12201360a27492ef9a8c6e46d6ba8d65e8f74295bea7cd19c9cd888329f
                                                              • Instruction Fuzzy Hash: 0821927190121C9FD754EBA4DC42FE97375AF88708F4000EDA609A7182EE759A988F69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __lock.LIBCMT ref: 00436C41
                                                                • Part of subcall function 0043385A: __mtinitlocknum.LIBCMT ref: 00433870
                                                                • Part of subcall function 0043385A: __amsg_exit.LIBCMT ref: 0043387C
                                                                • Part of subcall function 0043385A: EnterCriticalSection.KERNEL32(?,?,?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001), ref: 00433884
                                                              • InterlockedDecrement.KERNEL32(00000000), ref: 00436C53
                                                                • Part of subcall function 0042F2AE: __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0042F2AE: ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                                • Part of subcall function 0042F2AE: ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                                • Part of subcall function 0042F2AE: HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                                • Part of subcall function 0042F2AE: GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              • __lock.LIBCMT ref: 00436C81
                                                              • ___removelocaleref.LIBCMT ref: 00436C90
                                                              • ___freetlocinfo.LIBCMT ref: 00436CA9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __lock$CriticalDecrementEnterErrorFreeHeapInterlockedLastSection___freetlocinfo___removelocaleref___sbh_find_block___sbh_free_block__amsg_exit__mtinitlocknum
                                                              • String ID:
                                                              • API String ID: 1907232653-0
                                                              • Opcode ID: dddfa3f3178d8383d32f9b27f59e0bf06b1583cf40736a92abf47a8fd31915da
                                                              • Instruction ID: ec597f54dc5de8ed20ed2a1f663af052850153511863fb80e7f62ebd8217dee4
                                                              • Opcode Fuzzy Hash: dddfa3f3178d8383d32f9b27f59e0bf06b1583cf40736a92abf47a8fd31915da
                                                              • Instruction Fuzzy Hash: B1119131501306BADB246FA6D64575E77A4EF08725F26B46FF4D4972C1DE3CC880861D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __getptd.LIBCMT ref: 00436325
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __amsg_exit.LIBCMT ref: 00436345
                                                              • __lock.LIBCMT ref: 00436355
                                                              • InterlockedDecrement.KERNEL32(?), ref: 00436372
                                                              • InterlockedIncrement.KERNEL32(00467FD8), ref: 0043639D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                              • String ID:
                                                              • API String ID: 4271482742-0
                                                              • Opcode ID: 1c3ee6bdb297f0c583020a54c75024eb37d5180de5e8673e1c7c4d2d8cd9b9a2
                                                              • Instruction ID: 2120e401ec039c9d3c469062b26075b44e78161f10bd3444f52201ecc5acd4ca
                                                              • Opcode Fuzzy Hash: 1c3ee6bdb297f0c583020a54c75024eb37d5180de5e8673e1c7c4d2d8cd9b9a2
                                                              • Instruction Fuzzy Hash: 7401A131900713EBDB11AF66944574E7760BB08714F16912FEC14A3282DB7CA9428BDE
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0043385A: __mtinitlocknum.LIBCMT ref: 00433870
                                                                • Part of subcall function 0043385A: __amsg_exit.LIBCMT ref: 0043387C
                                                                • Part of subcall function 0043385A: EnterCriticalSection.KERNEL32(?,?,?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001), ref: 00433884
                                                              • ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                              • ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                              • HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                              • GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                              • String ID:
                                                              • API String ID: 2714421763-0
                                                              • Opcode ID: be5a6cb1eb5df8936d36834704c5a715c9b684255bafcbe413cb2a9fed154717
                                                              • Instruction ID: b01b193fb1bad3170891ec4c80f6ca9d339300dd53edf7a7ab97a6ea33272983
                                                              • Opcode Fuzzy Hash: be5a6cb1eb5df8936d36834704c5a715c9b684255bafcbe413cb2a9fed154717
                                                              • Instruction Fuzzy Hash: B601AC31A01315EADB20AFB1AD05B5E7AB49F05765FD0007FF804951D1DB7C85458E9D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,00000000,?,00000CCC,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00403D80
                                                                • Part of subcall function 00403660: ReadFile.KERNEL32(?,?,?,O>@,00000000,?,00403E4F,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 0040366B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$PointerRead
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 3154509469-3914906174
                                                              • Opcode ID: 5d98508b3de8acd582bae8ac88a94eb38bcbdce3d783b9f31bc7296ee13450e1
                                                              • Instruction ID: a623d500c4186b7208de29a6288d575388abf472c41b592f863d29a671c00f12
                                                              • Opcode Fuzzy Hash: 5d98508b3de8acd582bae8ac88a94eb38bcbdce3d783b9f31bc7296ee13450e1
                                                              • Instruction Fuzzy Hash: 04717D71A04701AFD314DF29D881A5AB7E9FB88315F444A3EF848E3780E738E9548BD6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 004050DC
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,?,00402A5E,?,00002000), ref: 004050EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocErrorHeapLast_malloc
                                                              • String ID: .\QHImageHlp.c$Certificate Table
                                                              • API String ID: 485325758-1472710443
                                                              • Opcode ID: 349a017d88896a46223a65075aa5d5ea743bd96e5839130b69b8610103239546
                                                              • Instruction ID: a446fb7a9fde2d7275c523b3a5589ebdd4a490cd7bb37a51f9c1ccee7326068c
                                                              • Opcode Fuzzy Hash: 349a017d88896a46223a65075aa5d5ea743bd96e5839130b69b8610103239546
                                                              • Instruction Fuzzy Hash: D4410575741B005BE320EB25EC41B97B3E0FF80711F04497FE989923C1E6B9A5088B9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00404EFC
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,00000003,004023AF,00000000), ref: 00404F0E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocErrorHeapLast_malloc
                                                              • String ID: .\QHImageHlp.c$Certificate Table
                                                              • API String ID: 485325758-1472710443
                                                              • Opcode ID: 62d59e5dec82c27ee1c675ce2e38e0508c742f546705f42b660697afc313c552
                                                              • Instruction ID: 56f707983adcd4c1712f8bbe2d9e1cbd60e6c7eff53ffe87e7f68e14888cd6f6
                                                              • Opcode Fuzzy Hash: 62d59e5dec82c27ee1c675ce2e38e0508c742f546705f42b660697afc313c552
                                                              • Instruction Fuzzy Hash: 4041D5B1741B015BE320DF25EC41F97B3E0EF80715F14893FE989923C1E6B9A5498B9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 0040155C
                                                              • SetLastError.KERNEL32(00000008,?,?,?,00401C5E,?,?), ref: 0040156C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_malloc
                                                              • String ID: .\QHCheckCertificate.c$:ghVI
                                                              • API String ID: 1018170914-279542517
                                                              • Opcode ID: e398552c40245c4c81058395fa59cc72440da4dc1ea5e3436f6df70d9f0a9f0b
                                                              • Instruction ID: f102504e1e88be22b862c4b36d41646d64cb99423fcae649bfb1a7f27528034d
                                                              • Opcode Fuzzy Hash: e398552c40245c4c81058395fa59cc72440da4dc1ea5e3436f6df70d9f0a9f0b
                                                              • Instruction Fuzzy Hash: E021A5F5701A117FD704EB59FD82A467390EB84319B10803BF909A7391F7F998258B9B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetProcAddress.KERNEL32(000013CC,CreateObject), ref: 0040C3F2
                                                              • FreeLibrary.KERNEL32(000013CC,?,0040C18C), ref: 0040C408
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: CreateObject
                                                              • API String ID: 3013587201-166191583
                                                              • Opcode ID: d6bd99be3fb84f35f21d06f6efc7538b6342fd60ee3495d6ffe4e42ac6a0d53d
                                                              • Instruction ID: 5dfa618b8ef0119369d955ab7243a8de27af72229873d7ba0b9cf45c338c119e
                                                              • Opcode Fuzzy Hash: d6bd99be3fb84f35f21d06f6efc7538b6342fd60ee3495d6ffe4e42ac6a0d53d
                                                              • Instruction Fuzzy Hash: FA21EA74A00308EFCB00DF94D5D4A6DBBB5BF49315F2082A9E905AB392C735EA81DB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 00408B28
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000), ref: 00408B46
                                                              • __snwprintf.LIBCMT ref: 00408B95
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$__getptd_noexit__snwprintf
                                                              • String ID: %s(%s:%d)
                                                              • API String ID: 2604959178-4223833681
                                                              • Opcode ID: 4c5ff8d7da7caec13398d7179f177572afe30be613d32b51b72e43316ceb08cc
                                                              • Instruction ID: c67e5680cbfc749e9507c7cc80fc2d4b5564d9924784b961a3afd699cde5ee08
                                                              • Opcode Fuzzy Hash: 4c5ff8d7da7caec13398d7179f177572afe30be613d32b51b72e43316ceb08cc
                                                              • Instruction Fuzzy Hash: 6801B972600704AFC720AFA5ED44AA773E8EF45751F00443FF94997351DBB8AC018799
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _swscanf.LIBCMT ref: 004035FD
                                                                • Part of subcall function 004324AF: _vscan_fn.LIBCMT ref: 004324C6
                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,004018B8,00000000,00000000), ref: 0040361F
                                                              • LocalFileTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,004018B8,00000000,00000000), ref: 00403632
                                                              Strings
                                                              • %hu-%hu-%hu %hu:%hu:%hu, xrefs: 004035F7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Time$File$LocalSystem_swscanf_vscan_fn
                                                              • String ID: %hu-%hu-%hu %hu:%hu:%hu
                                                              • API String ID: 3712118799-1004895946
                                                              • Opcode ID: 4751721bb5c0777da57fecde43eb29ccf8ba50de587755977e36d3932f733de8
                                                              • Instruction ID: 4c245d33534f4f5b71e5f77063661e55d37b6d60919a2df9bc087bf9af5aa4ff
                                                              • Opcode Fuzzy Hash: 4751721bb5c0777da57fecde43eb29ccf8ba50de587755977e36d3932f733de8
                                                              • Instruction Fuzzy Hash: 171100B2504301AFC365DFA5C980D9BB7E8ABDC701F044E2EF199D2250F675D648CB52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(KERNEL32,0043143A), ref: 0043CA79
                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0043CA89
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                              • API String ID: 1646373207-3105848591
                                                              • Opcode ID: f5942bad6fb0379af524b8fc5daf5af3d6fb922da830d66f21d94f1b5bcb83af
                                                              • Instruction ID: 8c0865540f6c5b330ea810b8011c9f56007bea3fab0405eb604f0991b59ca9d9
                                                              • Opcode Fuzzy Hash: f5942bad6fb0379af524b8fc5daf5af3d6fb922da830d66f21d94f1b5bcb83af
                                                              • Instruction Fuzzy Hash: A1F01D21A40B0DE2DB00ABA5AC4B36F7A75BB84743F9104A1D592F1096DF74C179D74A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadFile.KERNEL32(?,?,?,O>@,00000000,?,00403E4F,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 0040366B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID: .\QHImageHlp.c$O>@$ReadFile()
                                                              • API String ID: 2738559852-3347983201
                                                              • Opcode ID: ad8c54c6b13db8c91e8405195e36127eca5c805619a3687134a11327e549964d
                                                              • Instruction ID: e18dff2bf5f9ec833f0eb136256613232d54e553c4a64e595da327690e970206
                                                              • Opcode Fuzzy Hash: ad8c54c6b13db8c91e8405195e36127eca5c805619a3687134a11327e549964d
                                                              • Instruction Fuzzy Hash: 99E022B179030039F630A630AE47F2726488B84B03F20483FB449A06C1FDFD9840216A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0044E834
                                                              • __isleadbyte_l.LIBCMT ref: 0044E868
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000298,00000002,00000000), ref: 0044E899
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000298,00000002,00000000), ref: 0044E907
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: 29de12d916317f776575526a2aae219ef267f97f715b5e650989a8b0b88a1db2
                                                              • Instruction ID: 69bd48404784bb6eef6378d994ded7f0c02fa3b1a2743158cb33e4a36fb9aac3
                                                              • Opcode Fuzzy Hash: 29de12d916317f776575526a2aae219ef267f97f715b5e650989a8b0b88a1db2
                                                              • Instruction Fuzzy Hash: AF31B331A00255EFEF20EF66C8809BF7BA5FF01311F1445AAE4518B292E734DD40DB99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: allocator
                                                              • String ID:
                                                              • API String ID: 3447690668-0
                                                              • Opcode ID: 55a0b2266a5cad73a88afd20eacca5d9b6afaa86621e6d19beb791bcb8099d20
                                                              • Instruction ID: 098981022932cbdec035ca30eccc90540c584fe7df76098104e9694cbdb6509b
                                                              • Opcode Fuzzy Hash: 55a0b2266a5cad73a88afd20eacca5d9b6afaa86621e6d19beb791bcb8099d20
                                                              • Instruction Fuzzy Hash: 1D315EB1E001089FDB04DF99D841BEFBBB9EF48318F54452AE505A7382D73969148BB6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                              • String ID:
                                                              • API String ID: 3016257755-0
                                                              • Opcode ID: afc8384d7de5dc81d749eb2ef2e502e72940c946d5071aaa17129bf9d5fb4602
                                                              • Instruction ID: 8ded30c4d0808139d0a8f7a3334d2637decb54840f1bc3447c4a2fd338d10340
                                                              • Opcode Fuzzy Hash: afc8384d7de5dc81d749eb2ef2e502e72940c946d5071aaa17129bf9d5fb4602
                                                              • Instruction Fuzzy Hash: AE117BB600014ABBCF125E85CC85DEE3F62BF1C354F5A9416FE1868131C73AD9B2AB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __FF_MSGBANNER.LIBCMT ref: 0042FAB9
                                                                • Part of subcall function 00435C3E: __set_error_mode.LIBCMT ref: 00435C40
                                                                • Part of subcall function 00435C3E: __set_error_mode.LIBCMT ref: 00435C4D
                                                                • Part of subcall function 00435C3E: __NMSG_WRITE.LIBCMT ref: 00435C65
                                                                • Part of subcall function 00435C3E: __NMSG_WRITE.LIBCMT ref: 00435C6F
                                                              • __NMSG_WRITE.LIBCMT ref: 0042FAC0
                                                                • Part of subcall function 00435A6D: __set_error_mode.LIBCMT ref: 00435A9E
                                                                • Part of subcall function 00435A6D: __set_error_mode.LIBCMT ref: 00435AAF
                                                                • Part of subcall function 00435A6D: _strcpy_s.LIBCMT ref: 00435AE3
                                                                • Part of subcall function 00435A6D: __invoke_watson.LIBCMT ref: 00435AF4
                                                                • Part of subcall function 00435A6D: GetModuleFileNameA.KERNEL32(00000000,0046A8A9,00000104,?,?,00002000), ref: 00435B10
                                                                • Part of subcall function 00435A6D: _strcpy_s.LIBCMT ref: 00435B25
                                                                • Part of subcall function 00435A6D: __invoke_watson.LIBCMT ref: 00435B38
                                                                • Part of subcall function 00435A6D: _strlen.LIBCMT ref: 00435B41
                                                                • Part of subcall function 00435A6D: _strlen.LIBCMT ref: 00435B4E
                                                                • Part of subcall function 00435A6D: __invoke_watson.LIBCMT ref: 00435B7B
                                                                • Part of subcall function 0043157F: ___crtCorExitProcess.LIBCMT ref: 00431587
                                                                • Part of subcall function 0043157F: ExitProcess.KERNEL32 ref: 00431590
                                                              • HeapAlloc.KERNEL32(00000000,?), ref: 0042FAEC
                                                              • HeapAlloc.KERNEL32(00000000,?), ref: 0042FB1C
                                                                • Part of subcall function 0042FA5C: __lock.LIBCMT ref: 0042FA79
                                                                • Part of subcall function 0042FA5C: ___sbh_alloc_block.LIBCMT ref: 0042FA84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __set_error_mode$__invoke_watson$AllocExitHeapProcess_strcpy_s_strlen$FileModuleName___crt___sbh_alloc_block__lock
                                                              • String ID:
                                                              • API String ID: 913549098-0
                                                              • Opcode ID: 20a47c1bc0b3e505c4640fd5fbb8dac699cbe65c5832f50e0c64fbac4b9dec48
                                                              • Instruction ID: c97f2a1aac4336ca4233bb19fb3288db2da53e8740355d76d5640405a136ac55
                                                              • Opcode Fuzzy Hash: 20a47c1bc0b3e505c4640fd5fbb8dac699cbe65c5832f50e0c64fbac4b9dec48
                                                              • Instruction Fuzzy Hash: 19F0CD31A406256AEA205B15FC41F673764EF14368F901036FC1DE62E1D7A9AC908A9D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __getptd.LIBCMT ref: 00436B01
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __getptd.LIBCMT ref: 00436B18
                                                              • __amsg_exit.LIBCMT ref: 00436B26
                                                              • __lock.LIBCMT ref: 00436B36
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                              • String ID:
                                                              • API String ID: 3521780317-0
                                                              • Opcode ID: 6797a9c7ad89f79179c35410063c93c7be1a48fe7305491068951a5592eb683d
                                                              • Instruction ID: 69a392eba205855c063e8f8e15178e0c3a3eead262de5f737cc13f3cb72de6a7
                                                              • Opcode Fuzzy Hash: 6797a9c7ad89f79179c35410063c93c7be1a48fe7305491068951a5592eb683d
                                                              • Instruction Fuzzy Hash: 24F06231900711AAD610BB76840674DB7A06B08719F11A15FE441972D2DBACA901CF5E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 0042FC60
                                                                • Part of subcall function 004359B0: __FindPESection.LIBCMT ref: 00435A0B
                                                              • __getptd_noexit.LIBCMT ref: 0042FC70
                                                              • __freeptd.LIBCMT ref: 0042FC7A
                                                              • ExitThread.KERNEL32 ref: 0042FC83
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                              • String ID:
                                                              • API String ID: 3182216644-0
                                                              • Opcode ID: eb11f72c5c0a27ea54c39caa1cddff4bcdd230f116779656fea8b8d54851e959
                                                              • Instruction ID: 7fb2935e2eb5082df97cbdfaa4370d91d3abcb1d53863283408d7954f040c305
                                                              • Opcode Fuzzy Hash: eb11f72c5c0a27ea54c39caa1cddff4bcdd230f116779656fea8b8d54851e959
                                                              • Instruction Fuzzy Hash: B5D01270140B055AD6142773ED1E71B36686B24766FD81077BC00901B2DF7CE88DC91E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_malloc
                                                              • String ID: .\QHImageHlp.c
                                                              • API String ID: 1018170914-3639949391
                                                              • Opcode ID: 15c5622575b640bfbf16fac63390eca48eb95dedee77b54ee0b13ad915d23e3b
                                                              • Instruction ID: cd3631b3a4313c074cd8665c0dc88d8e640489f143659dcbe8033afe21fc79ee
                                                              • Opcode Fuzzy Hash: 15c5622575b640bfbf16fac63390eca48eb95dedee77b54ee0b13ad915d23e3b
                                                              • Instruction Fuzzy Hash: 99419DB2A01705AFC724DF1DD880A96BBE4FF44314F84863ED84997311E77AE6298BD1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00002000), ref: 004055FC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 973152223-3914906174
                                                              • Opcode ID: 2c843a153be4ab8f41abaeefdffeacd9e125d3a162f82d77d6fe0992c1cd8e6f
                                                              • Instruction ID: af7915da689cad80124b57681fae3e82e07b953628dcdcdd22db9ddc04efbc6b
                                                              • Opcode Fuzzy Hash: 2c843a153be4ab8f41abaeefdffeacd9e125d3a162f82d77d6fe0992c1cd8e6f
                                                              • Instruction Fuzzy Hash: B731D5767003156BD720DE25EC80EAB7395EBC8B56F44443AFD08E7380EA79AD058BA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00405A79
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,?), ref: 00405A89
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocErrorHeapLast_malloc
                                                              • String ID: .\QHImageHlp.c
                                                              • API String ID: 485325758-3639949391
                                                              • Opcode ID: 0f050a3acdf6a18f2331fc905689a8070437466b217d773e7a30d2c2608276d3
                                                              • Instruction ID: 4491f1e142483b7a0147f93706028f95dcf45ea172aec906f31b60bdc4f22acb
                                                              • Opcode Fuzzy Hash: 0f050a3acdf6a18f2331fc905689a8070437466b217d773e7a30d2c2608276d3
                                                              • Instruction Fuzzy Hash: 8421C7B1B40B046BD360DF6AEC81B53F7E4FB44714F80453EE94A92741EB7AB1188B99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetLastError.KERNEL32(00000008,0A0B9F7F,?,?,0046AFB0,0040BC07), ref: 00408A9D
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408A2C
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408A64
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408AD0
                                                              Strings
                                                              • F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h, xrefs: 00408AAD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8Throw$ErrorLast
                                                              • String ID: F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h
                                                              • API String ID: 3499917866-3244885242
                                                              • Opcode ID: 02cc4916ce66fc9f49ac957b759d5bf510f036ab9fdb672491d1735664b6ec29
                                                              • Instruction ID: 8a3096ca1bbf558694c1877c0cbee3ffcdde9a91d7c3d9ee8e518dbb288f5ca6
                                                              • Opcode Fuzzy Hash: 02cc4916ce66fc9f49ac957b759d5bf510f036ab9fdb672491d1735664b6ec29
                                                              • Instruction Fuzzy Hash: 7901A2B1944708BFC700EB95CD41F6BB7BCFB48B14F60452EB514A2281E7B895048B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s, xrefs: 00408C9C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __snwprintf_wcschr
                                                              • String ID: %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s
                                                              • API String ID: 1333472643-1296420124
                                                              • Opcode ID: 352b012345a64a84e7e5e2f65a586d5f98df0d664cd4b9c6f40050a57f8bcf49
                                                              • Instruction ID: 482bac71ccbccd4038da37c31077ade87015c13c61ee081a78d39986d3540162
                                                              • Opcode Fuzzy Hash: 352b012345a64a84e7e5e2f65a586d5f98df0d664cd4b9c6f40050a57f8bcf49
                                                              • Instruction Fuzzy Hash: 34110CB2210B10AAD720DB69DC45FB7B3F8EF8C701F00891EF69E86250E678A841C775
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00430A3C: __getptd.LIBCMT ref: 00430A42
                                                                • Part of subcall function 00430A3C: __getptd.LIBCMT ref: 00430A52
                                                              • __getptd.LIBCMT ref: 0043B2D4
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __getptd.LIBCMT ref: 0043B2E2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __getptd$__amsg_exit__getptd_noexit
                                                              • String ID: csm
                                                              • API String ID: 803148776-1018135373
                                                              • Opcode ID: 7355461b1db248cca9ced8da74d115863494b1204ec6fd7d3153c7297fa21868
                                                              • Instruction ID: bd3a09f85d3860faa45ff0aba6a44e215a3c079e7dabb4cc9a01332ad76f74b8
                                                              • Opcode Fuzzy Hash: 7355461b1db248cca9ced8da74d115863494b1204ec6fd7d3153c7297fa21868
                                                              • Instruction Fuzzy Hash: 9D018630801315CACF38AF61D4507AFB3B4FF28319F24642FE885963A1CB788981CB99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004036CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID: .\QHImageHlp.c$WriteFile()
                                                              • API String ID: 3934441357-642506210
                                                              • Opcode ID: 235889d1a65ddb66482a612ad4d7e918c2c37313952fb2fc37993eef172bfc64
                                                              • Instruction ID: 202be2d2f577f9c48df27ca0d14b2a50dfdd427c70a255348a94a199852964d9
                                                              • Opcode Fuzzy Hash: 235889d1a65ddb66482a612ad4d7e918c2c37313952fb2fc37993eef172bfc64
                                                              • Instruction Fuzzy Hash: 61E092B67507003EF628A670AD97FA72648C784B47F20883FB145E55C2F9EC9900256A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 0040375F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 973152223-3914906174
                                                              • Opcode ID: 71aa2a270ad45ce6d700e5ebd6e43204d34a3929848bd06162dfb3f87a5cca2d
                                                              • Instruction ID: 8f8977cb2d0b4ccc0947b00c7427ef8ecbdd6a3768c7b386d57dae8b174c95d6
                                                              • Opcode Fuzzy Hash: 71aa2a270ad45ce6d700e5ebd6e43204d34a3929848bd06162dfb3f87a5cca2d
                                                              • Instruction Fuzzy Hash: CCD05EB87803003AE61097309D86F2B329897C8F07F14886D7544F15D0F9FCE8006619
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()
                                                              • API String ID: 3433856609-1331291865
                                                              • Opcode ID: 0e9640600f9e4dc9bf96171d40720cf617bf7f8c4e8108b68e31724e6f487238
                                                              • Instruction ID: 7fe57b970132a0c306ad1d3e9a418fe7e91df63075c9b023bc58e2ed1317afab
                                                              • Opcode Fuzzy Hash: 0e9640600f9e4dc9bf96171d40720cf617bf7f8c4e8108b68e31724e6f487238
                                                              • Instruction Fuzzy Hash: 92C08CE4B9070436EA2827311F8BF6721896790F0BF4488BA7900E15C2FEFEC400602B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File
                                                              • String ID: .\QHImageHlp.c$SetEndOfFile()
                                                              • API String ID: 749574446-4247281097
                                                              • Opcode ID: 55f561706e4913504b1659c232cbceeeed4d33d718c83365b8535eeb1c4e46c9
                                                              • Instruction ID: 7b9951fb71824a071ea30372aa77385de4241c8a4e0098c10b8b1c0498ba7ca4
                                                              • Opcode Fuzzy Hash: 55f561706e4913504b1659c232cbceeeed4d33d718c83365b8535eeb1c4e46c9
                                                              • Instruction Fuzzy Hash: 60C08CB4B8070126EA2076312E4BF2B20899BE4F47F8488BAB404F25C2F9FCC5005019
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00408AFA,?,?,00000000,?,00403DA0,00403DA0,.\QHImageHlp.c,000000F9,SetFilePointerEx(),?,00403F3C,00000000), ref: 00408953
                                                              • SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408960
                                                                • Part of subcall function 00408380: GetLastError.KERNEL32(00000005,?,7622DFA0,?,00408984,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 00408395
                                                                • Part of subcall function 00408380: SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083B9
                                                                • Part of subcall function 00408380: GetLastError.KERNEL32(?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083DA
                                                                • Part of subcall function 00408380: _wcsrchr.LIBCMT ref: 00408443
                                                                • Part of subcall function 00408380: _wcsncpy.LIBCMT ref: 00408472
                                                              • SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408999
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004089DA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2310402585.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2310388760.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310441579.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310456117.0000000000467000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310467519.0000000000468000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310488635.000000000046D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2310717245.00000000004E7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$__getptd_noexit_wcsncpy_wcsrchr
                                                              • String ID:
                                                              • API String ID: 2296084122-0
                                                              • Opcode ID: 0d298b0919d4d87294302c951d50e0ecb365de6b4711658db1946db0a2c4a62c
                                                              • Instruction ID: 0ce4ff69a4c326d3965e6ec2f1d0d00c710584094203b3b5be746183993221b1
                                                              • Opcode Fuzzy Hash: 0d298b0919d4d87294302c951d50e0ecb365de6b4711658db1946db0a2c4a62c
                                                              • Instruction Fuzzy Hash: 8B114FB56006009FC614EB99D9C09ABB3E9EBC8311F10482EF695D7351CB38EC45CBAA
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Execution Graph

                                                              Execution Coverage:2.3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:4.8%
                                                              Total number of Nodes:1467
                                                              Total number of Limit Nodes:68
                                                              execution_graph 76639 565d06 76654 56b380 76639->76654 76641 565d0f 76665 5520f6 76641->76665 76645 565d2a 76646 567089 76645->76646 76672 551fd8 76645->76672 76675 551e8d 76646->76675 76650 551fd8 11 API calls 76651 56709e 76650->76651 76652 551fd8 11 API calls 76651->76652 76653 5670aa 76652->76653 76681 5520df 76654->76681 76659 56b3c5 InternetReadFile 76660 56b3e8 76659->76660 76660->76659 76662 56b415 InternetCloseHandle InternetCloseHandle 76660->76662 76664 551fd8 11 API calls 76660->76664 76692 5520b7 76660->76692 76663 56b427 76662->76663 76663->76641 76664->76660 76666 55210c 76665->76666 76667 5523ce 11 API calls 76666->76667 76668 552126 76667->76668 76669 552569 28 API calls 76668->76669 76670 552134 76669->76670 76671 554aa1 61 API calls ctype 76670->76671 76671->76645 76673 5523ce 11 API calls 76672->76673 76674 551fe1 76673->76674 76674->76646 76677 552163 76675->76677 76676 55219f 76676->76650 76677->76676 76749 552730 11 API calls 76677->76749 76679 552184 76750 552712 11 API calls std::_Deallocate 76679->76750 76682 5520e7 76681->76682 76698 5523ce 76682->76698 76684 5520f2 76685 58bd51 76684->76685 76690 596137 ___crtLCMapStringA 76685->76690 76686 596175 76704 5905dd 20 API calls __dosmaperr 76686->76704 76688 596160 RtlAllocateHeap 76689 56b39e InternetOpenW InternetOpenUrlW 76688->76689 76688->76690 76689->76659 76690->76686 76690->76688 76703 592f80 7 API calls 2 library calls 76690->76703 76693 5520bf 76692->76693 76694 5523ce 11 API calls 76693->76694 76695 5520ca 76694->76695 76705 55250a 76695->76705 76697 5520d9 76697->76660 76699 552428 76698->76699 76700 5523d8 76698->76700 76699->76684 76700->76699 76702 5527a7 11 API calls std::_Deallocate 76700->76702 76702->76699 76703->76690 76704->76689 76706 55251a 76705->76706 76707 552535 76706->76707 76708 552520 76706->76708 76722 5528e8 76707->76722 76712 552569 76708->76712 76711 552533 76711->76697 76733 552888 76712->76733 76714 55257d 76715 5525a7 76714->76715 76716 552592 76714->76716 76718 5528e8 28 API calls 76715->76718 76738 552a34 22 API calls 76716->76738 76721 5525a5 76718->76721 76719 55259b 76739 5529da 22 API calls 76719->76739 76721->76711 76723 5528f1 76722->76723 76724 552953 76723->76724 76725 5528fb 76723->76725 76747 5528a4 22 API calls 76724->76747 76728 552904 76725->76728 76729 552917 76725->76729 76741 552cae 76728->76741 76731 552915 76729->76731 76732 5523ce 11 API calls 76729->76732 76731->76711 76732->76731 76734 552890 76733->76734 76735 552898 76734->76735 76740 552ca3 22 API calls 76734->76740 76735->76714 76738->76719 76739->76721 76742 552cb8 __EH_prolog 76741->76742 76748 552e54 22 API calls 76742->76748 76744 552d24 76745 5523ce 11 API calls 76744->76745 76746 552d92 76745->76746 76746->76731 76748->76744 76749->76679 76750->76676 76751 55a2a4 76754 55a367 76751->76754 76753 55a2b5 76755 55a384 76754->76755 76756 55a3c7 CallNextHookEx 76754->76756 76757 55a3b0 76755->76757 76758 55a38f 76755->76758 76756->76753 76767 55b221 76757->76767 76759 55a394 76758->76759 76760 55a3a2 76758->76760 76759->76756 76824 55b646 38 API calls 76759->76824 76825 55b6a0 30 API calls 76760->76825 76765 55a3a0 76765->76756 76768 55b230 76767->76768 76772 55a3bc 76768->76772 76826 552093 76768->76826 76772->76756 76773 55b4ed 76772->76773 76774 55b507 76773->76774 76775 55b630 76773->76775 76776 55b50d 76774->76776 76777 55b58b 76774->76777 76837 55a3e0 76775->76837 76779 55b62e 76776->76779 76784 552093 28 API calls 76776->76784 76781 552093 28 API calls 76777->76781 76779->76756 76783 55b599 76781->76783 76785 552093 28 API calls 76783->76785 76786 55b535 76784->76786 76787 55b5a7 76785->76787 76847 58fcc6 44 API calls 76786->76847 76851 56bc5e 76787->76851 76790 55b5b7 76855 55b70e 31 API calls 76790->76855 76791 55b543 76793 552093 28 API calls 76791->76793 76795 55b553 76793->76795 76794 55b5ca 76797 56bc5e 28 API calls 76794->76797 76848 55919d 28 API calls 76795->76848 76799 55b5d8 76797->76799 76798 55b55e 76849 552ea1 28 API calls 76798->76849 76856 552fa5 28 API calls 76799->76856 76802 55b568 76850 55a611 29 API calls 76802->76850 76803 55b5e3 76857 552fa5 28 API calls 76803->76857 76806 55b570 76808 551fd8 11 API calls 76806->76808 76807 55b5ed 76858 55a636 29 API calls 76807->76858 76810 55b579 76808->76810 76812 551fd8 11 API calls 76810->76812 76811 55b5f5 76859 551f09 76811->76859 76814 55b582 76812->76814 76817 551fd8 11 API calls 76814->76817 76816 551f09 11 API calls 76818 55b607 76816->76818 76817->76779 76819 551f09 11 API calls 76818->76819 76820 55b610 76819->76820 76821 551f09 11 API calls 76820->76821 76822 55b61c 76821->76822 76823 551fd8 11 API calls 76822->76823 76823->76814 76824->76765 76825->76765 76827 55209b 76826->76827 76828 5523ce 11 API calls 76827->76828 76829 5520a6 76828->76829 76833 5524ed 76829->76833 76832 55a611 29 API calls 76832->76772 76834 5524f9 76833->76834 76835 55250a 28 API calls 76834->76835 76836 5520b1 76835->76836 76836->76832 76863 586e90 76837->76863 76839 55a401 6 API calls 76840 55a4d6 76839->76840 76841 55a468 ___scrt_get_show_window_mode 76839->76841 76842 55a4e6 ToUnicodeEx 76840->76842 76843 55a4cd 76841->76843 76846 55a4a4 ToUnicodeEx 76841->76846 76842->76842 76842->76843 76865 55417e 76843->76865 76846->76843 76847->76791 76848->76798 76849->76802 76850->76806 76852 56bc72 76851->76852 76912 55b904 76852->76912 76854 56bc7a 76854->76790 76855->76794 76856->76803 76857->76807 76858->76811 76860 552252 11 API calls 76859->76860 76861 551f12 76860->76861 76861->76816 76862 55a636 29 API calls 76862->76779 76864 586ea7 76863->76864 76864->76839 76864->76864 76866 554186 76865->76866 76871 552252 76866->76871 76868 554191 76875 5541bc 76868->76875 76872 5522ac 76871->76872 76873 55225c 76871->76873 76872->76868 76873->76872 76879 552779 11 API calls std::_Deallocate 76873->76879 76876 5541c8 76875->76876 76880 5541d9 76876->76880 76878 55419c 76878->76862 76879->76872 76881 5541e9 76880->76881 76882 554206 76881->76882 76883 5541ef 76881->76883 76897 5527e6 76882->76897 76887 554267 76883->76887 76886 554204 76886->76878 76888 552888 22 API calls 76887->76888 76889 55427b 76888->76889 76890 5542a5 76889->76890 76891 554290 76889->76891 76892 5527e6 28 API calls 76890->76892 76908 5542df 22 API calls 76891->76908 76896 5542a3 76892->76896 76894 554299 76909 552c48 22 API calls 76894->76909 76896->76886 76898 5527ef 76897->76898 76899 552851 76898->76899 76900 5527f9 76898->76900 76911 5528a4 22 API calls 76899->76911 76903 552802 76900->76903 76906 552815 76900->76906 76910 552aea 28 API calls __EH_prolog 76903->76910 76904 552813 76904->76886 76906->76904 76907 552252 11 API calls 76906->76907 76907->76904 76908->76894 76909->76896 76910->76904 76913 55b90c 76912->76913 76914 552252 11 API calls 76913->76914 76915 55b917 76914->76915 76918 55b92c 76915->76918 76917 55b926 76917->76854 76919 55b966 76918->76919 76920 55b938 76918->76920 76925 5528a4 22 API calls 76919->76925 76921 5527e6 28 API calls 76920->76921 76924 55b942 76921->76924 76924->76917 76926 5769e6 76927 5769fb 76926->76927 76939 576a8d 76926->76939 76928 576b44 76927->76928 76929 576a48 76927->76929 76930 576b1d 76927->76930 76931 576abd 76927->76931 76934 576af2 76927->76934 76938 576a7d 76927->76938 76927->76939 76954 574edd 49 API calls ctype 76927->76954 76928->76939 76959 576155 28 API calls 76928->76959 76929->76938 76929->76939 76955 56fb6c 52 API calls 76929->76955 76930->76928 76930->76939 76942 575ae1 76930->76942 76931->76934 76931->76939 76957 56fb6c 52 API calls 76931->76957 76934->76930 76958 5756f0 21 API calls 76934->76958 76938->76931 76938->76939 76956 574edd 49 API calls ctype 76938->76956 76943 575b00 ___scrt_get_show_window_mode 76942->76943 76945 575b0f 76943->76945 76949 575b34 76943->76949 76960 56ebbb 21 API calls 76943->76960 76945->76949 76953 575b14 76945->76953 76961 5705d8 46 API calls 76945->76961 76948 575b1d 76948->76949 76968 574d05 21 API calls 2 library calls 76948->76968 76949->76928 76951 575bb7 76951->76949 76962 582ec4 76951->76962 76953->76948 76953->76949 76967 56da5f 49 API calls 76953->76967 76954->76929 76955->76929 76956->76931 76957->76931 76958->76930 76959->76939 76960->76945 76961->76951 76963 582ece 76962->76963 76964 582ed2 76962->76964 76963->76953 76965 58bd51 _Yarn 21 API calls 76964->76965 76966 582ed7 76965->76966 76966->76953 76967->76948 76968->76949 76969 57f8ed 76970 57f8f8 76969->76970 76972 57f90c 76970->76972 76973 582eee 76970->76973 76974 582ef9 76973->76974 76975 582efd 76973->76975 76974->76972 76977 590f0d 76975->76977 76978 596185 76977->76978 76979 59619d 76978->76979 76980 596192 76978->76980 76981 5961a5 76979->76981 76988 5961ae ___crtLCMapStringA 76979->76988 76990 596137 76980->76990 76997 596782 76981->76997 76984 5961d8 HeapReAlloc 76986 59619a 76984->76986 76984->76988 76985 5961b3 77003 5905dd 20 API calls __dosmaperr 76985->77003 76986->76974 76988->76984 76988->76985 77004 592f80 7 API calls 2 library calls 76988->77004 76991 596175 76990->76991 76995 596145 ___crtLCMapStringA 76990->76995 77006 5905dd 20 API calls __dosmaperr 76991->77006 76993 596160 RtlAllocateHeap 76994 596173 76993->76994 76993->76995 76994->76986 76995->76991 76995->76993 77005 592f80 7 API calls 2 library calls 76995->77005 76998 5967b6 __dosmaperr 76997->76998 76999 59678d RtlFreeHeap 76997->76999 76998->76986 76999->76998 77000 5967a2 76999->77000 77007 5905dd 20 API calls __dosmaperr 77000->77007 77002 5967a8 GetLastError 77002->76998 77003->76986 77004->76988 77005->76995 77006->76994 77007->77002 77008 55165e 77009 551666 77008->77009 77010 551669 77008->77010 77011 5516a8 77010->77011 77013 551696 77010->77013 77016 5844ea 77011->77016 77015 5844ea new 22 API calls 77013->77015 77014 55169c 77015->77014 77019 5844ef 77016->77019 77017 58bd51 _Yarn 21 API calls 77017->77019 77018 58451b 77018->77014 77019->77017 77019->77018 77023 592f80 7 API calls 2 library calls 77019->77023 77024 584c35 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 77019->77024 77025 58526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 77019->77025 77023->77019 77026 576bdc 77032 576cb1 recv 77026->77032 77033 56dfbd 77034 56dfd2 ctype ___scrt_get_show_window_mode 77033->77034 77035 582ec4 21 API calls 77034->77035 77046 56e1d5 77034->77046 77038 56e182 ___scrt_get_show_window_mode 77035->77038 77037 56e1e6 77039 582ec4 21 API calls 77037->77039 77044 56e189 77037->77044 77040 582ec4 21 API calls 77038->77040 77038->77044 77041 56e21f ___scrt_get_show_window_mode 77039->77041 77043 56e1af ___scrt_get_show_window_mode 77040->77043 77041->77044 77048 58354a 77041->77048 77043->77044 77045 582ec4 21 API calls 77043->77045 77045->77046 77046->77044 77047 56db62 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 77046->77047 77047->77037 77051 583469 77048->77051 77050 583552 77050->77044 77052 583482 77051->77052 77056 583478 77051->77056 77053 582ec4 21 API calls 77052->77053 77052->77056 77054 5834a3 77053->77054 77054->77056 77057 583837 CryptAcquireContextA 77054->77057 77056->77050 77058 583858 CryptGenRandom 77057->77058 77059 583853 77057->77059 77058->77059 77060 58386d CryptReleaseContext 77058->77060 77059->77056 77060->77059 77061 576c4b 77066 576cc8 send 77061->77066 77067 584887 77068 584893 ___BuildCatchObject 77067->77068 77094 584596 77068->77094 77070 58489a 77072 5848c3 77070->77072 77392 5849f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 77070->77392 77079 584902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 77072->77079 77393 594251 5 API calls _ValidateLocalCookies 77072->77393 77074 5848dc 77075 5848e2 ___BuildCatchObject 77074->77075 77394 5941f5 5 API calls _ValidateLocalCookies 77074->77394 77077 584962 77105 584b14 77077->77105 77079->77077 77395 5933e7 36 API calls 5 library calls 77079->77395 77087 584984 77088 58498e 77087->77088 77397 59341f 28 API calls _Atexit 77087->77397 77090 584997 77088->77090 77398 5933c2 28 API calls _Atexit 77088->77398 77399 58470d 13 API calls 2 library calls 77090->77399 77093 58499f 77093->77075 77095 58459f 77094->77095 77400 584c52 IsProcessorFeaturePresent 77095->77400 77097 5845ab 77401 588f31 10 API calls 4 library calls 77097->77401 77099 5845b0 77100 5845b4 77099->77100 77402 5940bf IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 77099->77402 77100->77070 77102 5845bd 77103 5845cb 77102->77103 77403 588f5a 8 API calls 3 library calls 77102->77403 77103->77070 77106 586e90 ___scrt_get_show_window_mode 77105->77106 77107 584b27 GetStartupInfoW 77106->77107 77108 584968 77107->77108 77109 5941a2 77108->77109 77404 59f059 77109->77404 77111 584971 77114 55e9c5 77111->77114 77113 5941ab 77113->77111 77408 596815 36 API calls 77113->77408 77410 56cb50 LoadLibraryA GetProcAddress 77114->77410 77116 55e9e1 GetModuleFileNameW 77415 55f3c3 77116->77415 77118 55e9fd 77119 5520f6 28 API calls 77118->77119 77120 55ea0c 77119->77120 77121 5520f6 28 API calls 77120->77121 77122 55ea1b 77121->77122 77430 56be1b 77122->77430 77126 55ea2d 77127 551e8d 11 API calls 77126->77127 77128 55ea36 77127->77128 77129 55ea93 77128->77129 77130 55ea49 77128->77130 77456 551e65 77129->77456 77708 55fbb3 118 API calls 77130->77708 77133 55eaa3 77137 551e65 22 API calls 77133->77137 77134 55ea5b 77135 551e65 22 API calls 77134->77135 77136 55ea67 77135->77136 77709 560f37 36 API calls __EH_prolog 77136->77709 77138 55eac2 77137->77138 77461 55531e 77138->77461 77141 55ead1 77466 556383 77141->77466 77142 55ea79 77710 55fb64 78 API calls 77142->77710 77146 55ea82 77711 55f3b0 71 API calls 77146->77711 77150 551fd8 11 API calls 77151 55eaf2 77150->77151 77153 551fd8 11 API calls 77151->77153 77152 551fd8 11 API calls 77154 55eefb 77152->77154 77155 55eafb 77153->77155 77396 5932f6 GetModuleHandleW 77154->77396 77156 551e65 22 API calls 77155->77156 77157 55eb04 77156->77157 77480 551fc0 77157->77480 77159 55eb0f 77160 551e65 22 API calls 77159->77160 77161 55eb28 77160->77161 77162 551e65 22 API calls 77161->77162 77163 55eb43 77162->77163 77164 55ebae 77163->77164 77712 556c1e 77163->77712 77165 551e65 22 API calls 77164->77165 77171 55ebbb 77165->77171 77167 55eb70 77168 551fe2 28 API calls 77167->77168 77169 55eb7c 77168->77169 77172 551fd8 11 API calls 77169->77172 77170 55ec02 77484 55d069 77170->77484 77171->77170 77177 563549 3 API calls 77171->77177 77174 55eb85 77172->77174 77717 563549 RegOpenKeyExA 77174->77717 77175 55ec08 77176 55ea8b 77175->77176 77487 56b2c3 77175->77487 77176->77152 77183 55ebe6 77177->77183 77181 55f34f 77793 5639a9 30 API calls 77181->77793 77182 55ec23 77184 55ec76 77182->77184 77504 557716 77182->77504 77183->77170 77720 5639a9 30 API calls 77183->77720 77186 551e65 22 API calls 77184->77186 77189 55ec7f 77186->77189 77198 55ec90 77189->77198 77199 55ec8b 77189->77199 77191 55f365 77794 562475 65 API calls ___scrt_get_show_window_mode 77191->77794 77192 55ec42 77721 557738 30 API calls 77192->77721 77193 55ec4c 77196 551e65 22 API calls 77193->77196 77208 55ec55 77196->77208 77197 55f36f 77201 56bc5e 28 API calls 77197->77201 77204 551e65 22 API calls 77198->77204 77724 557755 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 77199->77724 77200 55ec47 77722 557260 98 API calls 77200->77722 77205 55f37f 77201->77205 77206 55ec99 77204->77206 77600 563a23 RegOpenKeyExW 77205->77600 77207 56bc5e 28 API calls 77206->77207 77209 55eca4 77207->77209 77208->77184 77212 55ec71 77208->77212 77508 551f13 77209->77508 77723 557260 98 API calls 77212->77723 77216 551f09 11 API calls 77217 55f39c 77216->77217 77219 551f09 11 API calls 77217->77219 77218 551f09 11 API calls 77220 55ecb8 77218->77220 77221 55f3a5 77219->77221 77222 551e65 22 API calls 77220->77222 77603 55dd42 77221->77603 77223 55ecc1 77222->77223 77227 551e65 22 API calls 77223->77227 77229 55ecdb 77227->77229 77228 55f3af 77230 551e65 22 API calls 77229->77230 77231 55ecf5 77230->77231 77232 551e65 22 API calls 77231->77232 77234 55ed0e 77232->77234 77233 55ed7b 77236 55ed8a 77233->77236 77241 55ef06 ___scrt_get_show_window_mode 77233->77241 77234->77233 77235 551e65 22 API calls 77234->77235 77240 55ed23 _wcslen 77235->77240 77237 55ed93 77236->77237 77265 55ee0f ___scrt_get_show_window_mode 77236->77265 77238 551e65 22 API calls 77237->77238 77239 55ed9c 77238->77239 77242 551e65 22 API calls 77239->77242 77240->77233 77243 551e65 22 API calls 77240->77243 77785 5636f8 RegOpenKeyExA 77241->77785 77244 55edae 77242->77244 77245 55ed3e 77243->77245 77247 551e65 22 API calls 77244->77247 77249 551e65 22 API calls 77245->77249 77248 55edc0 77247->77248 77252 551e65 22 API calls 77248->77252 77250 55ed53 77249->77250 77725 55da34 77250->77725 77251 55ef51 77253 551e65 22 API calls 77251->77253 77254 55ede9 77252->77254 77255 55ef76 77253->77255 77260 551e65 22 API calls 77254->77260 77261 552093 28 API calls 77255->77261 77258 551f13 28 API calls 77259 55ed72 77258->77259 77262 551f09 11 API calls 77259->77262 77263 55edfa 77260->77263 77264 55ef88 77261->77264 77262->77233 77783 55cdf9 45 API calls _wcslen 77263->77783 77527 56376f RegCreateKeyA 77264->77527 77517 563947 77265->77517 77270 55eea3 ctype 77274 551e65 22 API calls 77270->77274 77271 55ee0a 77271->77265 77272 551e65 22 API calls 77273 55efaa 77272->77273 77533 58baac 77273->77533 77275 55eeba 77274->77275 77275->77251 77278 55eece 77275->77278 77281 551e65 22 API calls 77278->77281 77279 55efc1 77788 56cd9b 87 API calls ___scrt_get_show_window_mode 77279->77788 77280 55efe4 77284 552093 28 API calls 77280->77284 77282 55eed7 77281->77282 77285 56bc5e 28 API calls 77282->77285 77287 55eff9 77284->77287 77288 55eee3 77285->77288 77286 55efc8 CreateThread 77286->77280 78548 56d45d 10 API calls 77286->78548 77289 552093 28 API calls 77287->77289 77784 55f474 104 API calls 77288->77784 77291 55f008 77289->77291 77537 56b4ef 77291->77537 77292 55eee8 77292->77251 77294 55eeef 77292->77294 77294->77176 77296 551e65 22 API calls 77297 55f019 77296->77297 77298 551e65 22 API calls 77297->77298 77299 55f02b 77298->77299 77300 551e65 22 API calls 77299->77300 77301 55f04b 77300->77301 77302 58baac _strftime 40 API calls 77301->77302 77303 55f058 77302->77303 77304 551e65 22 API calls 77303->77304 77305 55f063 77304->77305 77306 551e65 22 API calls 77305->77306 77307 55f074 77306->77307 77308 551e65 22 API calls 77307->77308 77309 55f089 77308->77309 77310 551e65 22 API calls 77309->77310 77311 55f09a 77310->77311 77312 55f0a1 StrToIntA 77311->77312 77561 559de4 77312->77561 77315 551e65 22 API calls 77316 55f0bc 77315->77316 77317 55f101 77316->77317 77318 55f0c8 77316->77318 77320 551e65 22 API calls 77317->77320 77319 5844ea new 22 API calls 77318->77319 77321 55f0d1 77319->77321 77322 55f111 77320->77322 77323 551e65 22 API calls 77321->77323 77326 55f11d 77322->77326 77327 55f159 77322->77327 77324 55f0e4 77323->77324 77325 55f0eb CreateThread 77324->77325 77325->77317 78550 569fb4 103 API calls 2 library calls 77325->78550 77328 5844ea new 22 API calls 77326->77328 77329 551e65 22 API calls 77327->77329 77331 55f126 77328->77331 77330 55f162 77329->77330 77334 55f1cc 77330->77334 77335 55f16e 77330->77335 77332 551e65 22 API calls 77331->77332 77333 55f138 77332->77333 77338 55f13f CreateThread 77333->77338 77336 551e65 22 API calls 77334->77336 77337 551e65 22 API calls 77335->77337 77339 55f1d5 77336->77339 77340 55f17e 77337->77340 77338->77327 78549 569fb4 103 API calls 2 library calls 77338->78549 77341 55f1e1 77339->77341 77342 55f21a 77339->77342 77343 551e65 22 API calls 77340->77343 77345 551e65 22 API calls 77341->77345 77586 56b60d GetComputerNameExW GetUserNameW 77342->77586 77346 55f193 77343->77346 77348 55f1ea 77345->77348 77789 55d9e8 31 API calls 77346->77789 77353 551e65 22 API calls 77348->77353 77349 551f13 28 API calls 77350 55f22e 77349->77350 77352 551f09 11 API calls 77350->77352 77355 55f237 77352->77355 77356 55f1ff 77353->77356 77354 55f1a6 77357 551f13 28 API calls 77354->77357 77358 55f240 SetProcessDEPPolicy 77355->77358 77359 55f243 CreateThread 77355->77359 77364 58baac _strftime 40 API calls 77356->77364 77360 55f1b2 77357->77360 77358->77359 77362 55f264 77359->77362 77363 55f258 CreateThread 77359->77363 78518 55f7a7 77359->78518 77361 551f09 11 API calls 77360->77361 77365 55f1bb CreateThread 77361->77365 77366 55f26d CreateThread 77362->77366 77367 55f279 77362->77367 77363->77362 78545 5620f7 138 API calls 77363->78545 77368 55f20c 77364->77368 77365->77334 78546 551be9 50 API calls _strftime 77365->78546 77366->77367 78547 5626db 38 API calls ___scrt_get_show_window_mode 77366->78547 77369 55f2cc 77367->77369 77371 552093 28 API calls 77367->77371 77790 55c162 7 API calls 77368->77790 77597 5634ff RegOpenKeyExA 77369->77597 77372 55f29c 77371->77372 77791 5552fd 28 API calls 77372->77791 77377 55f2ed 77379 56bc5e 28 API calls 77377->77379 77381 55f2fd 77379->77381 77792 56361b 31 API calls 77381->77792 77386 55f313 77387 551f09 11 API calls 77386->77387 77390 55f31e 77387->77390 77388 55f346 DeleteFileW 77389 55f34d 77388->77389 77388->77390 77389->77197 77390->77197 77390->77388 77391 55f334 Sleep 77390->77391 77391->77390 77392->77070 77393->77074 77394->77079 77395->77077 77396->77087 77397->77088 77398->77090 77399->77093 77400->77097 77401->77099 77402->77102 77403->77100 77405 59f062 77404->77405 77406 59f06b 77404->77406 77409 59ef58 49 API calls 5 library calls 77405->77409 77406->77113 77408->77113 77409->77406 77411 56cb8f LoadLibraryA GetProcAddress 77410->77411 77412 56cb7f GetModuleHandleA GetProcAddress 77410->77412 77413 56cbb8 44 API calls 77411->77413 77414 56cba8 LoadLibraryA GetProcAddress 77411->77414 77412->77411 77413->77116 77414->77413 77795 56b4a8 FindResourceA 77415->77795 77418 58bd51 _Yarn 21 API calls 77419 55f3ed ctype 77418->77419 77420 5520b7 28 API calls 77419->77420 77421 55f408 77420->77421 77422 551fe2 28 API calls 77421->77422 77423 55f413 77422->77423 77424 551fd8 11 API calls 77423->77424 77425 55f41c 77424->77425 77426 58bd51 _Yarn 21 API calls 77425->77426 77427 55f42d ctype 77426->77427 77798 556dd8 77427->77798 77429 55f460 77429->77118 77431 5520df 11 API calls 77430->77431 77436 56be2e 77431->77436 77432 551fd8 11 API calls 77433 56bed0 77432->77433 77434 551fd8 11 API calls 77433->77434 77437 56bed8 77434->77437 77435 56bea0 77438 5541a2 28 API calls 77435->77438 77436->77435 77442 551fe2 28 API calls 77436->77442 77447 551fd8 11 API calls 77436->77447 77451 56be9e 77436->77451 77801 5541a2 77436->77801 77804 56ce34 28 API calls 77436->77804 77440 551fd8 11 API calls 77437->77440 77441 56beac 77438->77441 77443 55ea24 77440->77443 77444 551fe2 28 API calls 77441->77444 77442->77436 77452 55fb17 77443->77452 77445 56beb5 77444->77445 77446 551fd8 11 API calls 77445->77446 77448 56bebd 77446->77448 77447->77436 77805 56ce34 28 API calls 77448->77805 77451->77432 77453 55fb23 77452->77453 77455 55fb2a 77452->77455 77812 552163 11 API calls 77453->77812 77455->77126 77457 551e6d 77456->77457 77458 551e75 77457->77458 77813 552158 22 API calls 77457->77813 77458->77133 77462 5520df 11 API calls 77461->77462 77463 55532a 77462->77463 77814 5532a0 77463->77814 77465 555346 77465->77141 77818 5551ef 77466->77818 77468 556391 77822 552055 77468->77822 77471 551fe2 77472 551ff1 77471->77472 77473 552039 77471->77473 77474 5523ce 11 API calls 77472->77474 77473->77150 77475 551ffa 77474->77475 77476 55203c 77475->77476 77477 552015 77475->77477 77478 55267a 11 API calls 77476->77478 77854 553098 28 API calls 77477->77854 77478->77473 77481 551fd2 77480->77481 77482 551fc9 77480->77482 77481->77159 77855 5525e0 28 API calls 77482->77855 77856 551fab 77484->77856 77486 55d073 CreateMutexA GetLastError 77486->77175 77857 56bfb7 77487->77857 77492 551fe2 28 API calls 77493 56b2ff 77492->77493 77494 551fd8 11 API calls 77493->77494 77495 56b307 77494->77495 77496 5635a6 31 API calls 77495->77496 77498 56b35d 77495->77498 77497 56b330 77496->77497 77499 56b33b StrToIntA 77497->77499 77498->77182 77500 56b352 77499->77500 77501 56b349 77499->77501 77503 551fd8 11 API calls 77500->77503 77865 56cf69 22 API calls 77501->77865 77503->77498 77505 55772a 77504->77505 77506 563549 3 API calls 77505->77506 77507 557731 77506->77507 77507->77192 77507->77193 77509 551f22 77508->77509 77516 551f6a 77508->77516 77510 552252 11 API calls 77509->77510 77511 551f2b 77510->77511 77512 551f46 77511->77512 77513 551f6d 77511->77513 77866 55305c 28 API calls 77512->77866 77867 552336 77513->77867 77516->77218 77518 563965 77517->77518 77519 556dd8 28 API calls 77518->77519 77520 56397a 77519->77520 77521 5520f6 28 API calls 77520->77521 77522 56398a 77521->77522 77523 56376f 14 API calls 77522->77523 77524 563994 77523->77524 77525 551fd8 11 API calls 77524->77525 77526 5639a1 77525->77526 77526->77270 77528 5637bf 77527->77528 77530 563788 77527->77530 77529 551fd8 11 API calls 77528->77529 77531 55ef9e 77529->77531 77532 56379a RegSetValueExA RegCloseKey 77530->77532 77531->77272 77532->77528 77534 58bac5 _strftime 77533->77534 77871 58ae03 77534->77871 77536 55efb7 77536->77279 77536->77280 77538 56b505 GetLocalTime 77537->77538 77539 56b5a0 77537->77539 77541 55531e 28 API calls 77538->77541 77540 551fd8 11 API calls 77539->77540 77543 56b5a8 77540->77543 77542 56b547 77541->77542 77544 556383 28 API calls 77542->77544 77545 551fd8 11 API calls 77543->77545 77546 56b553 77544->77546 77547 55f00d 77545->77547 77899 552f10 77546->77899 77547->77296 77550 556383 28 API calls 77551 56b56b 77550->77551 77904 557200 77 API calls 77551->77904 77553 56b579 77554 551fd8 11 API calls 77553->77554 77555 56b585 77554->77555 77556 551fd8 11 API calls 77555->77556 77557 56b58e 77556->77557 77558 551fd8 11 API calls 77557->77558 77559 56b597 77558->77559 77560 551fd8 11 API calls 77559->77560 77560->77539 77562 559e02 _wcslen 77561->77562 77563 559e24 77562->77563 77564 559e0d 77562->77564 77566 55da34 31 API calls 77563->77566 77565 55da34 31 API calls 77564->77565 77567 559e15 77565->77567 77568 559e2c 77566->77568 77569 551f13 28 API calls 77567->77569 77570 551f13 28 API calls 77568->77570 77572 559e1f 77569->77572 77571 559e3a 77570->77571 77573 551f09 11 API calls 77571->77573 77574 551f09 11 API calls 77572->77574 77575 559e42 77573->77575 77576 559e79 77574->77576 77923 55915b 28 API calls 77575->77923 77908 55a109 77576->77908 77579 559e54 77924 553014 77579->77924 77583 551f13 28 API calls 77584 559e69 77583->77584 77585 551f09 11 API calls 77584->77585 77585->77572 77587 55417e 28 API calls 77586->77587 77588 56b65c 77587->77588 78117 5542fc 77588->78117 77591 553014 28 API calls 77592 56b672 77591->77592 77593 551f09 11 API calls 77592->77593 77594 56b67b 77593->77594 77595 551f09 11 API calls 77594->77595 77596 55f223 77595->77596 77596->77349 77598 563520 RegQueryValueExA RegCloseKey 77597->77598 77599 55f2e4 77597->77599 77598->77599 77599->77221 77599->77377 77601 563a3f RegDeleteValueW 77600->77601 77602 55f392 77600->77602 77601->77602 77602->77216 77604 55dd5b 77603->77604 77605 5634ff 3 API calls 77604->77605 77606 55dd62 77605->77606 77607 55dd81 77606->77607 78194 551707 77606->78194 77611 564f2a 77607->77611 77609 55dd6f 78197 563877 RegCreateKeyA 77609->78197 77612 5520df 11 API calls 77611->77612 77613 564f3e 77612->77613 78211 56b8b3 77613->78211 77616 5520df 11 API calls 77617 564f54 77616->77617 77618 551e65 22 API calls 77617->77618 77619 564f62 77618->77619 77620 58baac _strftime 40 API calls 77619->77620 77621 564f6f 77620->77621 77622 564f74 Sleep 77621->77622 77623 564f81 77621->77623 77622->77623 77624 552093 28 API calls 77623->77624 77625 564f90 77624->77625 77626 551e65 22 API calls 77625->77626 77627 564f99 77626->77627 77628 5520f6 28 API calls 77627->77628 77629 564fa4 77628->77629 77630 56be1b 28 API calls 77629->77630 77631 564fac 77630->77631 78215 55489e WSAStartup 77631->78215 77633 564fb6 77634 551e65 22 API calls 77633->77634 77635 564fbf 77634->77635 77636 551e65 22 API calls 77635->77636 77655 56503e 77635->77655 77637 564fd8 77636->77637 77638 551e65 22 API calls 77637->77638 77639 564fe9 77638->77639 77641 551e65 22 API calls 77639->77641 77640 56be1b 28 API calls 77640->77655 77642 564ffa 77641->77642 77643 551e65 22 API calls 77642->77643 77645 56500b 77643->77645 77644 556c1e 28 API calls 77644->77655 77648 551e65 22 API calls 77645->77648 77646 552f10 28 API calls 77646->77655 77647 551fe2 28 API calls 77647->77655 77649 56501c 77648->77649 77650 551e65 22 API calls 77649->77650 77651 56502e 77650->77651 78352 55473d 89 API calls 77651->78352 77653 55531e 28 API calls 77653->77655 77654 556383 28 API calls 77654->77655 77655->77640 77655->77644 77655->77646 77655->77647 77655->77653 77655->77654 77656 551e65 22 API calls 77655->77656 77658 56518c WSAGetLastError 77655->77658 77672 552093 28 API calls 77655->77672 77673 56b4ef 80 API calls 77655->77673 77674 551fd8 11 API calls 77655->77674 77677 55905c 28 API calls 77655->77677 77678 591e81 20 API calls 77655->77678 77679 5520f6 28 API calls 77655->77679 77680 5636f8 3 API calls 77655->77680 77681 5635a6 31 API calls 77655->77681 77682 55417e 28 API calls 77655->77682 77686 56bb8e 28 API calls 77655->77686 77687 551e65 22 API calls 77655->77687 77706 56519c 77655->77706 78216 564ee9 77655->78216 78221 55482d 77655->78221 78228 554f51 77655->78228 78243 5548c8 connect 77655->78243 78303 56b7e0 77655->78303 78306 5645bd 77655->78306 78309 55dd89 77655->78309 78315 56bc42 77655->78315 78318 56bd1e 77655->78318 77656->77655 78353 56cae1 30 API calls 77658->78353 77662 552093 28 API calls 77662->77706 77665 56b4ef 80 API calls 77665->77706 77666 551fd8 11 API calls 77666->77706 77668 551e8d 11 API calls 77668->77706 77669 551e65 22 API calls 77669->77706 77670 58baac _strftime 40 API calls 77671 565acf Sleep 77670->77671 77671->77706 77672->77655 77673->77655 77674->77655 77677->77655 77678->77655 77679->77655 77680->77655 77681->77655 77682->77655 77686->77655 77688 565439 GetTickCount 77687->77688 77689 56bb8e 28 API calls 77688->77689 77702 565456 77689->77702 77691 56bb8e 28 API calls 77691->77702 77693 56bd1e 28 API calls 77693->77702 77696 556383 28 API calls 77696->77702 77697 552ea1 28 API calls 77697->77702 77698 552f10 28 API calls 77698->77702 77700 551fd8 11 API calls 77700->77702 77701 551f09 11 API calls 77701->77702 77702->77691 77702->77693 77702->77696 77702->77697 77702->77698 77702->77700 77702->77701 78322 56bae6 77702->78322 78324 56ba96 77702->78324 78329 55f8d1 GetLocaleInfoA 77702->78329 78332 552f31 28 API calls 77702->78332 78333 554c10 77702->78333 78355 554aa1 61 API calls ctype 77702->78355 77705 565a71 CreateThread 77705->77706 78511 56ad17 104 API calls 77705->78511 77706->77655 77706->77662 77706->77665 77706->77666 77706->77668 77706->77669 77706->77670 77706->77705 77707 551f09 11 API calls 77706->77707 78354 5552fd 28 API calls 77706->78354 78356 55b051 85 API calls 77706->78356 78357 554e26 99 API calls 77706->78357 77707->77706 77708->77134 77709->77142 77710->77146 77713 5520df 11 API calls 77712->77713 77714 556c2a 77713->77714 77715 5532a0 28 API calls 77714->77715 77716 556c47 77715->77716 77716->77167 77718 563573 RegQueryValueExA RegCloseKey 77717->77718 77719 55eba4 77717->77719 77718->77719 77719->77164 77719->77181 77720->77170 77721->77200 77722->77193 77723->77184 77724->77198 77726 551f86 11 API calls 77725->77726 77727 55da50 77726->77727 77728 55daa5 77727->77728 77729 55da70 77727->77729 77730 55da66 77727->77730 77733 56bfb7 GetCurrentProcess 77728->77733 78512 56b5b4 29 API calls 77729->78512 77732 55db99 GetLongPathNameW 77730->77732 77735 55417e 28 API calls 77732->77735 77736 55daaa 77733->77736 77734 55da79 77737 551f13 28 API calls 77734->77737 77738 55dbae 77735->77738 77739 55db00 77736->77739 77740 55daae 77736->77740 77741 55da83 77737->77741 77742 55417e 28 API calls 77738->77742 77743 55417e 28 API calls 77739->77743 77744 55417e 28 API calls 77740->77744 77748 551f09 11 API calls 77741->77748 77745 55dbbd 77742->77745 77746 55db0e 77743->77746 77747 55dabc 77744->77747 78515 55ddd1 28 API calls 77745->78515 77751 55417e 28 API calls 77746->77751 77752 55417e 28 API calls 77747->77752 77748->77730 77750 55dbd0 78516 552fa5 28 API calls 77750->78516 77755 55db24 77751->77755 77756 55dad2 77752->77756 77754 55dbdb 78517 552fa5 28 API calls 77754->78517 78514 552fa5 28 API calls 77755->78514 78513 552fa5 28 API calls 77756->78513 77760 55dbe5 77763 551f09 11 API calls 77760->77763 77761 55db2f 77764 551f13 28 API calls 77761->77764 77762 55dadd 77765 551f13 28 API calls 77762->77765 77766 55dbef 77763->77766 77767 55db3a 77764->77767 77768 55dae8 77765->77768 77769 551f09 11 API calls 77766->77769 77770 551f09 11 API calls 77767->77770 77771 551f09 11 API calls 77768->77771 77772 55dbf8 77769->77772 77773 55db43 77770->77773 77774 55daf1 77771->77774 77775 551f09 11 API calls 77772->77775 77776 551f09 11 API calls 77773->77776 77777 551f09 11 API calls 77774->77777 77778 55dc01 77775->77778 77776->77741 77777->77741 77779 551f09 11 API calls 77778->77779 77780 55dc0a 77779->77780 77781 551f09 11 API calls 77780->77781 77782 55dc13 77781->77782 77782->77258 77783->77271 77784->77292 77786 56371e RegQueryValueExA RegCloseKey 77785->77786 77787 563742 77785->77787 77786->77787 77787->77251 77788->77286 77789->77354 77790->77342 77792->77386 77793->77191 77796 56b4c5 LoadResource LockResource SizeofResource 77795->77796 77797 55f3de 77795->77797 77796->77797 77797->77418 77799 5520b7 28 API calls 77798->77799 77800 556dec 77799->77800 77800->77429 77806 55423a 77801->77806 77804->77436 77805->77451 77807 554243 77806->77807 77808 5523ce 11 API calls 77807->77808 77809 55424e 77808->77809 77810 552569 28 API calls 77809->77810 77811 5541b5 77810->77811 77811->77436 77812->77455 77816 5532aa 77814->77816 77815 5532c9 77815->77465 77816->77815 77817 5528e8 28 API calls 77816->77817 77817->77815 77819 5551fb 77818->77819 77828 555274 77819->77828 77821 555208 77821->77468 77823 552061 77822->77823 77824 5523ce 11 API calls 77823->77824 77825 55207b 77824->77825 77850 55267a 77825->77850 77829 555282 77828->77829 77830 55529e 77829->77830 77831 555288 77829->77831 77833 5552f5 77830->77833 77835 5552b6 77830->77835 77839 5525f0 77831->77839 77848 5528a4 22 API calls 77833->77848 77837 5528e8 28 API calls 77835->77837 77838 55529c 77835->77838 77837->77838 77838->77821 77840 552888 22 API calls 77839->77840 77841 552602 77840->77841 77842 552672 77841->77842 77843 552629 77841->77843 77849 5528a4 22 API calls 77842->77849 77846 5528e8 28 API calls 77843->77846 77847 55263b 77843->77847 77846->77847 77847->77838 77851 55268b 77850->77851 77852 5523ce 11 API calls 77851->77852 77853 55208d 77852->77853 77853->77471 77854->77473 77855->77481 77858 56bfc4 GetCurrentProcess 77857->77858 77859 56b2d1 77857->77859 77858->77859 77860 5635a6 RegOpenKeyExA 77859->77860 77861 5635d4 RegQueryValueExA RegCloseKey 77860->77861 77862 5635fe 77860->77862 77861->77862 77863 552093 28 API calls 77862->77863 77864 563613 77863->77864 77864->77492 77865->77500 77866->77516 77868 552347 77867->77868 77869 552252 11 API calls 77868->77869 77870 5523c7 77869->77870 77870->77516 77887 58ba0a 77871->77887 77873 58ae50 77893 58a7b7 36 API calls 3 library calls 77873->77893 77874 58ae2a 77892 5905dd 20 API calls __dosmaperr 77874->77892 77875 58ae15 77875->77873 77875->77874 77878 58ae2f _strftime 77875->77878 77878->77536 77880 58ae5c 77881 58ae8b 77880->77881 77894 58ba4f 40 API calls __Tolower 77880->77894 77882 58aef7 77881->77882 77895 58b9b6 20 API calls 2 library calls 77881->77895 77896 58b9b6 20 API calls 2 library calls 77882->77896 77885 58afbe _strftime 77885->77878 77897 5905dd 20 API calls __dosmaperr 77885->77897 77888 58ba0f 77887->77888 77889 58ba22 77887->77889 77898 5905dd 20 API calls __dosmaperr 77888->77898 77889->77875 77891 58ba14 _strftime 77891->77875 77892->77878 77893->77880 77894->77880 77895->77882 77896->77885 77897->77878 77898->77891 77905 551fb0 77899->77905 77901 552f1e 77902 552055 11 API calls 77901->77902 77903 552f2d 77902->77903 77903->77550 77904->77553 77906 5525f0 28 API calls 77905->77906 77907 551fbd 77906->77907 77907->77901 77909 55a127 77908->77909 77910 563549 3 API calls 77909->77910 77911 55a12e 77910->77911 77912 55a142 77911->77912 77913 55a15c 77911->77913 77914 559e9b 77912->77914 77915 55a147 77912->77915 77929 55905c 77913->77929 77914->77315 77917 55905c 28 API calls 77915->77917 77919 55a155 77917->77919 77957 55a22d 29 API calls 77919->77957 77922 55a15a 77922->77914 77923->77579 78094 553222 77924->78094 77926 553022 78098 553262 77926->78098 77930 559072 77929->77930 77931 552252 11 API calls 77930->77931 77932 55908c 77931->77932 77933 554267 28 API calls 77932->77933 77934 55909a 77933->77934 77935 55a179 77934->77935 77958 55b8ec 77935->77958 77938 55a1a2 77940 552093 28 API calls 77938->77940 77939 55a1ca 77941 552093 28 API calls 77939->77941 77942 55a1ac 77940->77942 77943 55a1d5 77941->77943 77944 56bc5e 28 API calls 77942->77944 77945 552093 28 API calls 77943->77945 77946 55a1ba 77944->77946 77947 55a1e4 77945->77947 77962 55b164 31 API calls _Yarn 77946->77962 77949 56b4ef 80 API calls 77947->77949 77951 55a1e9 CreateThread 77949->77951 77950 55a1c1 77952 551fd8 11 API calls 77950->77952 77953 55a204 CreateThread 77951->77953 77954 55a210 CreateThread 77951->77954 77964 55a27d 77951->77964 77952->77939 77953->77954 77970 55a267 77953->77970 77955 551f09 11 API calls 77954->77955 77967 55a289 77954->77967 77956 55a224 77955->77956 77956->77914 77957->77922 78093 55a273 162 API calls 77957->78093 77959 55b8f5 77958->77959 77960 55a197 77958->77960 77963 55b96c 28 API calls 77959->77963 77960->77938 77960->77939 77962->77950 77963->77960 77973 55a726 77964->77973 78020 55acd6 77967->78020 78071 55a2b8 77970->78071 77974 55a73b Sleep 77973->77974 77994 55a675 77974->77994 77976 55a286 77977 55a77b CreateDirectoryW 77982 55a74d 77977->77982 77978 55a78c GetFileAttributesW 77978->77982 77979 551e65 22 API calls 77979->77982 77980 55a7a3 SetFileAttributesW 77980->77982 77982->77974 77982->77976 77982->77977 77982->77978 77982->77979 77982->77980 77992 55a7ee 77982->77992 78007 56c3f1 77982->78007 77983 55a81d PathFileExistsW 77983->77992 77984 5520df 11 API calls 77984->77992 77986 5520b7 28 API calls 77986->77992 77987 55a926 SetFileAttributesW 77987->77982 77988 551fd8 11 API calls 77988->77992 77989 551fe2 28 API calls 77989->77992 77990 556dd8 28 API calls 77990->77992 77992->77983 77992->77984 77992->77986 77992->77987 77992->77988 77992->77989 77992->77990 77993 551fd8 11 API calls 77992->77993 78017 56c485 32 API calls 77992->78017 78018 56c4f2 CreateFileW SetFilePointer CloseHandle WriteFile FindCloseChangeNotification 77992->78018 77993->77982 77995 55a722 77994->77995 77997 55a68b 77994->77997 77995->77982 77996 55a6aa CreateFileW 77996->77997 77998 55a6b8 GetFileSize 77996->77998 77997->77996 77999 55a6ed FindCloseChangeNotification 77997->77999 78000 55a6ff 77997->78000 78001 55a6e2 Sleep 77997->78001 78002 55a6db 77997->78002 77998->77997 77998->77999 77999->77997 78000->77995 78004 55905c 28 API calls 78000->78004 78001->77999 78019 55b0dc 84 API calls 78002->78019 78005 55a71b 78004->78005 78006 55a179 123 API calls 78005->78006 78006->77995 78008 56c404 CreateFileW 78007->78008 78010 56c441 78008->78010 78011 56c43d 78008->78011 78012 56c461 WriteFile 78010->78012 78013 56c448 SetFilePointer 78010->78013 78011->77982 78014 56c476 FindCloseChangeNotification 78012->78014 78015 56c474 78012->78015 78013->78012 78016 56c458 CloseHandle 78013->78016 78014->78011 78015->78014 78016->78011 78017->77992 78018->77992 78019->78001 78025 55ace4 78020->78025 78021 55a292 78022 55ad3e Sleep GetForegroundWindow GetWindowTextLengthW 78023 55b904 28 API calls 78022->78023 78023->78025 78025->78021 78025->78022 78029 56bae6 GetTickCount 78025->78029 78030 55ad84 GetWindowTextW 78025->78030 78032 55b8ec 28 API calls 78025->78032 78033 55aedc 78025->78033 78035 55ae49 Sleep 78025->78035 78038 552093 28 API calls 78025->78038 78039 55add1 78025->78039 78043 556383 28 API calls 78025->78043 78045 553014 28 API calls 78025->78045 78046 55a636 29 API calls 78025->78046 78047 56bc5e 28 API calls 78025->78047 78048 551f09 11 API calls 78025->78048 78049 551fd8 11 API calls 78025->78049 78050 5843e6 EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 78025->78050 78051 551f86 78025->78051 78055 584770 23 API calls __onexit 78025->78055 78056 5843a7 SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 78025->78056 78057 559044 28 API calls 78025->78057 78059 55b97c 28 API calls 78025->78059 78060 55b748 40 API calls 2 library calls 78025->78060 78061 591e81 78025->78061 78065 5552fd 28 API calls 78025->78065 78029->78025 78030->78025 78032->78025 78034 551f09 11 API calls 78033->78034 78034->78021 78035->78025 78038->78025 78039->78025 78041 55905c 28 API calls 78039->78041 78058 55b164 31 API calls _Yarn 78039->78058 78041->78039 78043->78025 78045->78025 78046->78025 78047->78025 78048->78025 78049->78025 78052 551f8e 78051->78052 78053 552252 11 API calls 78052->78053 78054 551f99 78053->78054 78054->78025 78055->78025 78056->78025 78057->78025 78058->78039 78059->78025 78060->78025 78062 591e8d 78061->78062 78066 591c7d 78062->78066 78064 591eae 78064->78025 78067 591c94 78066->78067 78069 591ccb _strftime 78067->78069 78070 5905dd 20 API calls __dosmaperr 78067->78070 78069->78064 78070->78069 78072 55a2d1 SetWindowsHookExA 78071->78072 78073 55a333 KiUserCallbackDispatcher 78071->78073 78072->78073 78076 55a2ed GetLastError 78072->78076 78074 55a345 TranslateMessage DispatchMessageA 78073->78074 78086 55a270 78073->78086 78074->78073 78074->78086 78087 56bb8e 78076->78087 78088 591e81 20 API calls 78087->78088 78089 56bbb2 78088->78089 78090 552093 28 API calls 78089->78090 78091 55a2fe 78090->78091 78092 5552fd 28 API calls 78091->78092 78095 55322e 78094->78095 78104 553618 78095->78104 78097 55323b 78097->77926 78099 55326e 78098->78099 78100 552252 11 API calls 78099->78100 78101 553288 78100->78101 78102 552336 11 API calls 78101->78102 78103 553031 78102->78103 78103->77583 78105 553626 78104->78105 78106 55362c 78105->78106 78107 553644 78105->78107 78115 5536a6 28 API calls 78106->78115 78109 55365c 78107->78109 78110 55369e 78107->78110 78113 5527e6 28 API calls 78109->78113 78114 553642 78109->78114 78116 5528a4 22 API calls 78110->78116 78113->78114 78114->78097 78115->78114 78122 554353 78117->78122 78119 55430a 78120 553262 11 API calls 78119->78120 78121 554319 78120->78121 78121->77591 78123 55435f 78122->78123 78126 554371 78123->78126 78125 55436d 78125->78119 78127 55437f 78126->78127 78128 554385 78127->78128 78129 55439e 78127->78129 78192 5534e6 28 API calls 78128->78192 78130 552888 22 API calls 78129->78130 78131 5543a6 78130->78131 78133 5543bf 78131->78133 78134 554419 78131->78134 78137 5527e6 28 API calls 78133->78137 78145 55439c 78133->78145 78193 5528a4 22 API calls 78134->78193 78137->78145 78145->78125 78192->78145 78200 58aa9a 78194->78200 78198 56388f RegSetValueExA RegCloseKey 78197->78198 78199 5638b9 78197->78199 78198->78199 78199->77607 78203 58aa1b 78200->78203 78202 55170d 78202->77609 78204 58aa2a 78203->78204 78205 58aa3e 78203->78205 78209 5905dd 20 API calls __dosmaperr 78204->78209 78207 58aa2f __alldvrm _strftime 78205->78207 78210 598957 11 API calls 2 library calls 78205->78210 78207->78202 78209->78207 78210->78207 78212 56b8f9 ctype ___scrt_get_show_window_mode 78211->78212 78213 552093 28 API calls 78212->78213 78214 564f49 78213->78214 78214->77616 78215->77633 78217 564f02 getaddrinfo WSASetLastError 78216->78217 78218 564ef8 78216->78218 78217->77655 78358 564d86 29 API calls ___std_exception_copy 78218->78358 78220 564efd 78220->78217 78222 554846 socket 78221->78222 78223 554839 78221->78223 78225 554860 CreateEventW 78222->78225 78226 554842 78222->78226 78359 55489e WSAStartup 78223->78359 78225->77655 78226->77655 78227 55483e 78227->78222 78227->78226 78229 554fea 78228->78229 78230 554f65 78228->78230 78229->77655 78231 554f6e 78230->78231 78232 554fc0 CreateEventA CreateThread 78230->78232 78233 554f7d GetLocalTime 78230->78233 78231->78232 78232->78229 78361 555150 78232->78361 78234 56bb8e 28 API calls 78233->78234 78235 554f91 78234->78235 78360 5552fd 28 API calls 78235->78360 78244 5548ee 78243->78244 78245 554a1b 78243->78245 78246 55497e 78244->78246 78248 554923 78244->78248 78251 55531e 28 API calls 78244->78251 78245->78246 78247 554a21 WSAGetLastError 78245->78247 78246->77655 78247->78246 78249 554a31 78247->78249 78365 570c60 27 API calls 78248->78365 78252 554a36 78249->78252 78253 554932 78249->78253 78255 55490f 78251->78255 78370 56cae1 30 API calls 78252->78370 78258 552093 28 API calls 78253->78258 78254 55492b 78254->78253 78257 554941 78254->78257 78259 552093 28 API calls 78255->78259 78268 554987 78257->78268 78269 554950 78257->78269 78261 554a80 78258->78261 78262 55491e 78259->78262 78260 554a40 78371 5552fd 28 API calls 78260->78371 78265 552093 28 API calls 78261->78265 78266 56b4ef 80 API calls 78262->78266 78270 554a8f 78265->78270 78266->78248 78367 571a40 54 API calls 78268->78367 78273 552093 28 API calls 78269->78273 78274 56b4ef 80 API calls 78270->78274 78277 55495f 78273->78277 78274->78246 78276 55498f 78279 5549c4 78276->78279 78280 554994 78276->78280 78281 552093 28 API calls 78277->78281 78369 570e06 28 API calls 78279->78369 78283 552093 28 API calls 78280->78283 78284 55496e 78281->78284 78286 5549a3 78283->78286 78287 56b4ef 80 API calls 78284->78287 78290 552093 28 API calls 78286->78290 78291 554973 78287->78291 78288 5549cc 78289 5549f9 CreateEventW CreateEventW 78288->78289 78292 552093 28 API calls 78288->78292 78289->78246 78293 5549b2 78290->78293 78366 56e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 78291->78366 78294 5549e2 78292->78294 78295 56b4ef 80 API calls 78293->78295 78297 552093 28 API calls 78294->78297 78298 5549b7 78295->78298 78299 5549f1 78297->78299 78368 5710b2 52 API calls 78298->78368 78301 56b4ef 80 API calls 78299->78301 78302 5549f6 78301->78302 78302->78289 78372 56b7b6 GlobalMemoryStatusEx 78303->78372 78305 56b7f5 78305->77655 78373 564580 78306->78373 78310 55dda5 78309->78310 78311 5634ff 3 API calls 78310->78311 78313 55ddac 78311->78313 78312 55ddc4 78312->77655 78313->78312 78314 563549 3 API calls 78313->78314 78314->78312 78316 5520b7 28 API calls 78315->78316 78317 56bc57 78316->78317 78317->77655 78319 56bd2b 78318->78319 78320 5520b7 28 API calls 78319->78320 78321 56bd3d 78320->78321 78321->77655 78323 56bafc GetTickCount 78322->78323 78323->77702 78325 586e90 ___scrt_get_show_window_mode 78324->78325 78326 56bab5 GetForegroundWindow GetWindowTextW 78325->78326 78327 55417e 28 API calls 78326->78327 78328 56badf 78327->78328 78328->77702 78330 552093 28 API calls 78329->78330 78331 55f8f6 78330->78331 78331->77702 78332->77702 78334 5520df 11 API calls 78333->78334 78335 554c27 78334->78335 78336 5520df 11 API calls 78335->78336 78350 554c30 78336->78350 78337 58bd51 _Yarn 21 API calls 78337->78350 78339 554c96 78341 554ca1 78339->78341 78339->78350 78340 5520b7 28 API calls 78340->78350 78424 554e26 99 API calls 78341->78424 78342 551fe2 28 API calls 78342->78350 78344 554ca8 78346 551fd8 11 API calls 78344->78346 78345 551fd8 11 API calls 78345->78350 78347 554cb1 78346->78347 78348 551fd8 11 API calls 78347->78348 78349 554cba 78348->78349 78349->77706 78350->78337 78350->78339 78350->78340 78350->78342 78350->78345 78411 554cc3 78350->78411 78423 554b96 57 API calls 78350->78423 78352->77655 78353->77706 78355->77702 78356->77706 78357->77706 78358->78220 78359->78227 78364 55515c 102 API calls 78361->78364 78363 555159 78364->78363 78365->78254 78366->78246 78367->78276 78368->78291 78369->78288 78370->78260 78372->78305 78376 564553 78373->78376 78377 564568 ___scrt_initialize_default_local_stdio_options 78376->78377 78380 58f79d 78377->78380 78383 58c4f0 78380->78383 78384 58c518 78383->78384 78385 58c530 78383->78385 78405 5905dd 20 API calls __dosmaperr 78384->78405 78385->78384 78386 58c538 78385->78386 78406 58a7b7 36 API calls 3 library calls 78386->78406 78389 58c548 78407 58cc76 20 API calls 2 library calls 78389->78407 78390 58c51d _strftime 78398 584fcb 78390->78398 78393 564576 78393->77655 78394 58c5c0 78408 58d2e4 51 API calls 3 library calls 78394->78408 78397 58c5cb 78409 58cce0 20 API calls _free 78397->78409 78399 584fd4 78398->78399 78400 584fd6 IsProcessorFeaturePresent 78398->78400 78399->78393 78402 585018 78400->78402 78410 584fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 78402->78410 78404 5850fb 78404->78393 78405->78390 78406->78389 78407->78394 78408->78397 78409->78390 78410->78404 78412 5520df 11 API calls 78411->78412 78422 554cde 78412->78422 78413 554e13 78414 551fd8 11 API calls 78413->78414 78415 554e1c 78414->78415 78415->78339 78416 5541a2 28 API calls 78416->78422 78417 551fe2 28 API calls 78417->78422 78418 551fd8 11 API calls 78418->78422 78419 551fc0 28 API calls 78421 554dad CreateEventA CreateThread WaitForSingleObject FindCloseChangeNotification 78419->78421 78420 5520f6 28 API calls 78420->78422 78421->78422 78425 565aea 78421->78425 78422->78413 78422->78416 78422->78417 78422->78418 78422->78419 78422->78420 78423->78350 78424->78344 78426 5520f6 28 API calls 78425->78426 78427 565b0c SetEvent 78426->78427 78428 565b21 78427->78428 78429 5541a2 28 API calls 78428->78429 78430 565b3b 78429->78430 78431 5520f6 28 API calls 78430->78431 78432 565b4b 78431->78432 78433 5520f6 28 API calls 78432->78433 78434 565b5d 78433->78434 78435 56be1b 28 API calls 78434->78435 78436 565b66 78435->78436 78437 567089 78436->78437 78438 565b86 GetTickCount 78436->78438 78439 565d2f 78436->78439 78440 551e8d 11 API calls 78437->78440 78441 56bb8e 28 API calls 78438->78441 78439->78437 78502 565ce5 78439->78502 78442 567092 78440->78442 78443 565b97 78441->78443 78445 551fd8 11 API calls 78442->78445 78446 56bae6 GetTickCount 78443->78446 78447 56709e 78445->78447 78448 565ba3 78446->78448 78449 551fd8 11 API calls 78447->78449 78450 56bb8e 28 API calls 78448->78450 78451 5670aa 78449->78451 78452 565bae 78450->78452 78453 56ba96 30 API calls 78452->78453 78454 565bbc 78453->78454 78455 56bd1e 28 API calls 78454->78455 78456 565bca 78455->78456 78457 551e65 22 API calls 78456->78457 78458 565bd8 78457->78458 78504 552f31 28 API calls 78458->78504 78460 565be6 78505 552ea1 28 API calls 78460->78505 78462 565bf5 78463 552f10 28 API calls 78462->78463 78464 565c04 78463->78464 78506 552ea1 28 API calls 78464->78506 78466 565c13 78467 552f10 28 API calls 78466->78467 78468 565c1f 78467->78468 78507 552ea1 28 API calls 78468->78507 78470 565c29 78508 554aa1 61 API calls ctype 78470->78508 78472 565c38 78473 551fd8 11 API calls 78472->78473 78474 565c41 78473->78474 78475 551fd8 11 API calls 78474->78475 78476 565c4d 78475->78476 78477 551fd8 11 API calls 78476->78477 78478 565c59 78477->78478 78479 551fd8 11 API calls 78478->78479 78480 565c65 78479->78480 78481 551fd8 11 API calls 78480->78481 78482 565c71 78481->78482 78483 551fd8 11 API calls 78482->78483 78484 565c7d 78483->78484 78485 551f09 11 API calls 78484->78485 78486 565c86 78485->78486 78487 551fd8 11 API calls 78486->78487 78488 565c8f 78487->78488 78489 551fd8 11 API calls 78488->78489 78490 565c98 78489->78490 78491 551e65 22 API calls 78490->78491 78492 565ca3 78491->78492 78493 58baac _strftime 40 API calls 78492->78493 78494 565cb0 78493->78494 78495 565cb5 78494->78495 78496 565cdb 78494->78496 78498 565cc3 78495->78498 78499 565cce 78495->78499 78497 551e65 22 API calls 78496->78497 78497->78502 78509 554ff4 82 API calls 78498->78509 78501 554f51 105 API calls 78499->78501 78503 565cc9 78501->78503 78502->78437 78510 5550e4 84 API calls 78502->78510 78503->78437 78504->78460 78505->78462 78506->78466 78507->78470 78508->78472 78509->78503 78510->78503 78512->77734 78513->77762 78514->77761 78515->77750 78516->77754 78517->77760 78520 55f7c2 78518->78520 78519 563549 3 API calls 78519->78520 78520->78519 78521 55f7f4 78520->78521 78522 55f866 78520->78522 78524 55f856 Sleep 78520->78524 78523 55905c 28 API calls 78521->78523 78521->78524 78527 56bc5e 28 API calls 78521->78527 78533 551f09 11 API calls 78521->78533 78536 552093 28 API calls 78521->78536 78540 56376f 14 API calls 78521->78540 78551 55d096 112 API calls ___scrt_get_show_window_mode 78521->78551 78552 563814 14 API calls 78521->78552 78525 55905c 28 API calls 78522->78525 78523->78521 78524->78520 78528 55f871 78525->78528 78527->78521 78529 56bc5e 28 API calls 78528->78529 78530 55f87d 78529->78530 78553 563814 14 API calls 78530->78553 78533->78521 78534 55f890 78535 551f09 11 API calls 78534->78535 78537 55f89c 78535->78537 78536->78521 78538 552093 28 API calls 78537->78538 78539 55f8ad 78538->78539 78541 56376f 14 API calls 78539->78541 78540->78521 78542 55f8c0 78541->78542 78554 562850 TerminateProcess WaitForSingleObject 78542->78554 78544 55f8c8 ExitProcess 78555 5627ee 62 API calls 78545->78555 78552->78521 78553->78534 78554->78544

                                                              Control-flow Graph

                                                              APIs
                                                              • LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0055E9E1), ref: 0056CB65
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CB6E
                                                              • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0055E9E1), ref: 0056CB85
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CB88
                                                              • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0055E9E1), ref: 0056CB9A
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CB9D
                                                              • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0055E9E1), ref: 0056CBAE
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CBB1
                                                              • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0055E9E1), ref: 0056CBC3
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CBC6
                                                              • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0055E9E1), ref: 0056CBD2
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CBD5
                                                              • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0055E9E1), ref: 0056CBE6
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CBE9
                                                              • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0055E9E1), ref: 0056CBFA
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CBFD
                                                              • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0055E9E1), ref: 0056CC0E
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC11
                                                              • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0055E9E1), ref: 0056CC22
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC25
                                                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0055E9E1), ref: 0056CC36
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC39
                                                              • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0055E9E1), ref: 0056CC4A
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC4D
                                                              • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0055E9E1), ref: 0056CC5E
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC61
                                                              • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0055E9E1), ref: 0056CC72
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC75
                                                              • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0055E9E1), ref: 0056CC83
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC86
                                                              • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0055E9E1), ref: 0056CC97
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CC9A
                                                              • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0055E9E1), ref: 0056CCA7
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CCAA
                                                              • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0055E9E1), ref: 0056CCB7
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CCBA
                                                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0055E9E1), ref: 0056CCCC
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CCCF
                                                              • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0055E9E1), ref: 0056CCDC
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CCDF
                                                              • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0055E9E1), ref: 0056CCF0
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CCF3
                                                              • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0055E9E1), ref: 0056CD04
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CD07
                                                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmStartSession,?,?,?,?,0055E9E1), ref: 0056CD19
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CD1C
                                                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0055E9E1), ref: 0056CD29
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CD2C
                                                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0055E9E1), ref: 0056CD39
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CD3C
                                                              • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0055E9E1), ref: 0056CD49
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056CD4C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad$HandleModule
                                                              • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                              • API String ID: 4236061018-3687161714
                                                              • Opcode ID: 18cd780b3a682a9dd66a2f6f79656dbc0662c591e91a6faadef409b435c09a70
                                                              • Instruction ID: da508ccbb79a134b441c5a672ea6500d242bc879728d3f223861971fcfd9541b
                                                              • Opcode Fuzzy Hash: 18cd780b3a682a9dd66a2f6f79656dbc0662c591e91a6faadef409b435c09a70
                                                              • Instruction Fuzzy Hash: 0841F0A4E807587EDA107BB65C5DD9B3DACF9617943414827B018A7150DAB8FC04DFAC
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1260 55a2b8-55a2cf 1261 55a2d1-55a2eb SetWindowsHookExA 1260->1261 1262 55a333-55a343 KiUserCallbackDispatcher 1260->1262 1261->1262 1267 55a2ed-55a331 GetLastError call 56bb8e call 5552fd call 552093 call 56b4ef call 551fd8 1261->1267 1263 55a345-55a35d TranslateMessage DispatchMessageA 1262->1263 1264 55a35f 1262->1264 1263->1262 1263->1264 1265 55a361-55a366 1264->1265 1267->1265
                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0055A2D3
                                                              • SetWindowsHookExA.USER32(0000000D,0055A2A4,00000000), ref: 0055A2E1
                                                              • GetLastError.KERNEL32 ref: 0055A2ED
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 0055A33B
                                                              • TranslateMessage.USER32(?), ref: 0055A34A
                                                              • DispatchMessageA.USER32(?), ref: 0055A355
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Message$CallbackDispatchDispatcherErrorHandleHookLastLocalModuleTimeTranslateUserWindows
                                                              • String ID: Keylogger initialization failure: error $`#v
                                                              • API String ID: 941179788-3226811161
                                                              • Opcode ID: 3894722bacde9c3b6053ff2aed5fa8e03c22c35f2bcbef51823944ff49aaab35
                                                              • Instruction ID: f89e5f56a9899ce7b7d85cdd1e6802e1a071d69d2c8beddb76941ed7f603634a
                                                              • Opcode Fuzzy Hash: 3894722bacde9c3b6053ff2aed5fa8e03c22c35f2bcbef51823944ff49aaab35
                                                              • Instruction Fuzzy Hash: ED119171514602AB9B106B79DC1E86B7FFCFBE6716B100A2FFC85C2190EA709908C762
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • GetForegroundWindow.USER32(?,?,005C50F0), ref: 0055A416
                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 0055A422
                                                              • GetKeyboardLayout.USER32(00000000), ref: 0055A429
                                                              • GetKeyState.USER32(00000010), ref: 0055A433
                                                              • GetKeyboardState.USER32(?,?,005C50F0), ref: 0055A43E
                                                              • ToUnicodeEx.USER32(005C5144,?,?,?,00000010,00000000,00000000), ref: 0055A461
                                                              • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0055A4C1
                                                              • ToUnicodeEx.USER32(005C5144,?,?,?,00000010,00000000,00000000), ref: 0055A4FA
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                              • String ID:
                                                              • API String ID: 1888522110-0
                                                              • Opcode ID: 8e664c3416300c4fd86c690184f0832bbed758e01b405cc0d21bdb4f57586e61
                                                              • Instruction ID: ce02045a8a29085128bfe694793b8bd1ba185bafc7a6384295534bc420f4abb2
                                                              • Opcode Fuzzy Hash: 8e664c3416300c4fd86c690184f0832bbed758e01b405cc0d21bdb4f57586e61
                                                              • Instruction Fuzzy Hash: 36315F72504305BFDB10DB94DC49FDBBBECFB98744F00082AB645D61A0E6B1A94C9BA2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1295 56b380-56b3c3 call 5520df call 58bd51 InternetOpenW InternetOpenUrlW 1300 56b3c5-56b3e6 InternetReadFile 1295->1300 1301 56b40c-56b40f 1300->1301 1302 56b3e8-56b408 call 5520b7 call 553376 call 551fd8 1300->1302 1304 56b415-56b422 InternetCloseHandle * 2 call 58bd4c 1301->1304 1305 56b411-56b413 1301->1305 1302->1301 1309 56b427-56b431 1304->1309 1305->1300 1305->1304
                                                              APIs
                                                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0056B3A7
                                                              • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0056B3BD
                                                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0056B3D6
                                                              • InternetCloseHandle.WININET(00000000), ref: 0056B41C
                                                              • InternetCloseHandle.WININET(00000000), ref: 0056B41F
                                                              Strings
                                                              • http://geoplugin.net/json.gp, xrefs: 0056B3B7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Internet$CloseHandleOpen$FileRead
                                                              • String ID: http://geoplugin.net/json.gp
                                                              • API String ID: 3121278467-91888290
                                                              • Opcode ID: c7b2d2ac17722e56516b3d06d42210d180ce889325229d9af3db9fb448fe0d4d
                                                              • Instruction ID: 8319ae0f45236b154ee8ee960cbaceb1b3de762583aa0baad8a19fd1b2766f9f
                                                              • Opcode Fuzzy Hash: c7b2d2ac17722e56516b3d06d42210d180ce889325229d9af3db9fb448fe0d4d
                                                              • Instruction Fuzzy Hash: 0D1182311063226BD624AB259C5DEBF7F9CFF86761F00052EF805D2191DB649949C7B2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                                • Part of subcall function 00563549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00563569
                                                                • Part of subcall function 00563549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,005C52F0), ref: 00563587
                                                                • Part of subcall function 00563549: RegCloseKey.KERNEL32(?), ref: 00563592
                                                              • Sleep.KERNEL32(00000BB8), ref: 0055F85B
                                                              • ExitProcess.KERNEL32 ref: 0055F8CA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseExitOpenProcessQuerySleepValue
                                                              • String ID: 4.9.4 Pro$override$pth_unenc
                                                              • API String ID: 2281282204-930821335
                                                              • Opcode ID: 24c1343afe5f347169e5332833ed860397abbc01cd86f3c0c8325628c32a27de
                                                              • Instruction ID: 64803a7cf73d5bcec36bbdb94bc22d0ab48ce2110c0856bd54b35dea42b65c9c
                                                              • Opcode Fuzzy Hash: 24c1343afe5f347169e5332833ed860397abbc01cd86f3c0c8325628c32a27de
                                                              • Instruction Fuzzy Hash: 3721F761B1460267CA0876798C7FBAE3DA9BFC5712F40002DF806572D7EE259E0983B6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,005834BF,00000034,?,?,0090D7B8), ref: 00583849
                                                              • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00583552,00000000,?,00000000), ref: 0058385F
                                                              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,00583552,00000000,?,00000000,0056E251), ref: 00583871
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Crypt$Context$AcquireRandomRelease
                                                              • String ID:
                                                              • API String ID: 1815803762-0
                                                              • Opcode ID: 556233e78c43d4b6f7040fc63c256a5bbdae549c7ed849e2d61ce0baa93463bb
                                                              • Instruction ID: 6464d22c197035df66de55737d456ba1b361a1e02fd538d9435fa55e21547601
                                                              • Opcode Fuzzy Hash: 556233e78c43d4b6f7040fc63c256a5bbdae549c7ed849e2d61ce0baa93463bb
                                                              • Instruction Fuzzy Hash: B3E09231309220BAEB301F25AC0CF573E65FB92BA0F200939F612F40E4E25288049A54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetComputerNameExW.KERNEL32(00000001,?,0000002B,005C50E4), ref: 0056B62A
                                                              • GetUserNameW.ADVAPI32(?,0055F223), ref: 0056B642
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Name$ComputerUser
                                                              • String ID:
                                                              • API String ID: 4229901323-0
                                                              • Opcode ID: 4b61dd7c23d8540c5296dacbe0e36155d446bb38843830267b549d4faae88719
                                                              • Instruction ID: 0830f2a1548e5017192116b85b737e9307b62543aae4e5c340c95207b7e71fae
                                                              • Opcode Fuzzy Hash: 4b61dd7c23d8540c5296dacbe0e36155d446bb38843830267b549d4faae88719
                                                              • Instruction Fuzzy Hash: 0001FF7190051DABCB04EBD4DC59EDEBBBCBF44306F100156B806A61A1EE706A8DCBA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,005654FC,005C4EE0,005C5A00,005C4EE0,00000000,005C4EE0,00000000,005C4EE0,4.9.4 Pro), ref: 0055F8E5
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID:
                                                              • API String ID: 2299586839-0
                                                              • Opcode ID: 6a8206e4403b50dd048002a696c848facf1e340186255e929eaf5279141128d3
                                                              • Instruction ID: 3de1cff7c4c71e91c549aca22337bc2572cc7a0612d24b7dc1f45f6126ce1623
                                                              • Opcode Fuzzy Hash: 6a8206e4403b50dd048002a696c848facf1e340186255e929eaf5279141128d3
                                                              • Instruction Fuzzy Hash: 55D05B3074411C77D61496959C0EEAA7B9CE701B52F000196BE05D72C0D9E15E0487D1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 5 55e9c5-55ea47 call 56cb50 GetModuleFileNameW call 55f3c3 call 5520f6 * 2 call 56be1b call 55fb17 call 551e8d call 58fd00 22 55ea93-55eb5b call 551e65 call 551fab call 551e65 call 55531e call 556383 call 551fe2 call 551fd8 * 2 call 551e65 call 551fc0 call 555aa6 call 551e65 call 5551e3 call 551e65 call 5551e3 5->22 23 55ea49-55ea8e call 55fbb3 call 551e65 call 551fab call 560f37 call 55fb64 call 55f3b0 5->23 69 55eb5d-55eba8 call 556c1e call 551fe2 call 551fd8 call 551fab call 563549 22->69 70 55ebae-55ebc9 call 551e65 call 55b9bd 22->70 49 55eef2-55ef03 call 551fd8 23->49 69->70 100 55f34f-55f36a call 551fab call 5639a9 call 562475 69->100 79 55ec03-55ec0a call 55d069 70->79 80 55ebcb-55ebea call 551fab call 563549 70->80 88 55ec13-55ec1a 79->88 89 55ec0c-55ec0e 79->89 80->79 99 55ebec-55ec02 call 551fab call 5639a9 80->99 94 55ec1c 88->94 95 55ec1e-55ec2a call 56b2c3 88->95 93 55eef1 89->93 93->49 94->95 104 55ec33-55ec37 95->104 105 55ec2c-55ec2e 95->105 99->79 126 55f36f-55f3a0 call 56bc5e call 551f04 call 563a23 call 551f09 * 2 100->126 108 55ec76-55ec89 call 551e65 call 551fab 104->108 109 55ec39 call 557716 104->109 105->104 127 55ec90-55ed18 call 551e65 call 56bc5e call 551f13 call 551f09 call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab 108->127 128 55ec8b call 557755 108->128 117 55ec3e-55ec40 109->117 120 55ec42-55ec47 call 557738 call 557260 117->120 121 55ec4c-55ec5f call 551e65 call 551fab 117->121 120->121 121->108 141 55ec61-55ec67 121->141 156 55f3a5-55f3af call 55dd42 call 564f2a 126->156 177 55ed80-55ed84 127->177 178 55ed1a-55ed33 call 551e65 call 551fab call 58bad6 127->178 128->127 141->108 144 55ec69-55ec6f 141->144 144->108 147 55ec71 call 557260 144->147 147->108 180 55ef06-55ef66 call 586e90 call 55247c call 551fab * 2 call 5636f8 call 559057 177->180 181 55ed8a-55ed91 177->181 178->177 204 55ed35-55ed7b call 551e65 call 551fab call 551e65 call 551fab call 55da34 call 551f13 call 551f09 178->204 234 55ef6b-55efbf call 551e65 call 551fab call 552093 call 551fab call 56376f call 551e65 call 551fab call 58baac 180->234 183 55ed93-55ee0d call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab call 55cdf9 181->183 184 55ee0f-55ee19 call 559057 181->184 190 55ee1e-55ee42 call 55247c call 584798 183->190 184->190 211 55ee44-55ee4f call 586e90 190->211 212 55ee51 190->212 204->177 217 55ee53-55ee9e call 551f04 call 58f809 call 55247c call 551fab call 55247c call 551fab call 563947 211->217 212->217 272 55eea3-55eec8 call 5847a1 call 551e65 call 55b9bd 217->272 286 55efc1 234->286 287 55efdc-55efde 234->287 272->234 288 55eece-55eeed call 551e65 call 56bc5e call 55f474 272->288 289 55efc3-55efda call 56cd9b CreateThread 286->289 290 55efe4 287->290 291 55efe0-55efe2 287->291 288->234 306 55eeef 288->306 295 55efea-55f0c6 call 552093 * 2 call 56b4ef call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab call 58baac call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab call 551e65 call 551fab StrToIntA call 559de4 call 551e65 call 551fab 289->295 290->295 291->289 344 55f101 295->344 345 55f0c8-55f0ff call 5844ea call 551e65 call 551fab CreateThread 295->345 306->93 346 55f103-55f11b call 551e65 call 551fab 344->346 345->346 357 55f11d-55f154 call 5844ea call 551e65 call 551fab CreateThread 346->357 358 55f159-55f16c call 551e65 call 551fab 346->358 357->358 367 55f1cc-55f1df call 551e65 call 551fab 358->367 368 55f16e-55f1c7 call 551e65 call 551fab call 551e65 call 551fab call 55d9e8 call 551f13 call 551f09 CreateThread 358->368 379 55f1e1-55f215 call 551e65 call 551fab call 551e65 call 551fab call 58baac call 55c162 367->379 380 55f21a-55f23e call 56b60d call 551f13 call 551f09 367->380 368->367 379->380 400 55f240-55f241 SetProcessDEPPolicy 380->400 401 55f243-55f256 CreateThread 380->401 400->401 405 55f264-55f26b 401->405 406 55f258-55f262 CreateThread 401->406 410 55f26d-55f277 CreateThread 405->410 411 55f279-55f280 405->411 406->405 410->411 412 55f282-55f285 411->412 413 55f28e 411->413 415 55f287-55f28c 412->415 416 55f2cc-55f2df call 551fab call 5634ff 412->416 418 55f293-55f2c7 call 552093 call 5552fd call 552093 call 56b4ef call 551fd8 413->418 415->418 425 55f2e4-55f2e7 416->425 418->416 425->156 427 55f2ed-55f32d call 56bc5e call 551f04 call 56361b call 551f09 call 551f04 425->427 443 55f346-55f34b DeleteFileW 427->443 444 55f34d 443->444 445 55f32f-55f332 443->445 444->126 445->126 446 55f334-55f341 Sleep call 551f04 445->446 446->443
                                                              APIs
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(Psapi,GetProcessImageFileNameW,?,?,?,?,0055E9E1), ref: 0056CB65
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CB6E
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0055E9E1), ref: 0056CB85
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CB88
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0055E9E1), ref: 0056CB9A
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CB9D
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0055E9E1), ref: 0056CBAE
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CBB1
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0055E9E1), ref: 0056CBC3
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CBC6
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0055E9E1), ref: 0056CBD2
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CBD5
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0055E9E1), ref: 0056CBE6
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CBE9
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0055E9E1), ref: 0056CBFA
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CBFD
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0055E9E1), ref: 0056CC0E
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CC11
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0055E9E1), ref: 0056CC22
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CC25
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0055E9E1), ref: 0056CC36
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CC39
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0055E9E1), ref: 0056CC4A
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CC4D
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0055E9E1), ref: 0056CC5E
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CC61
                                                                • Part of subcall function 0056CB50: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0055E9E1), ref: 0056CC72
                                                                • Part of subcall function 0056CB50: GetProcAddress.KERNEL32(00000000), ref: 0056CC75
                                                                • Part of subcall function 0056CB50: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0055E9E1), ref: 0056CC83
                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\tu.exe,00000104), ref: 0055E9EE
                                                                • Part of subcall function 00560F37: __EH_prolog.LIBCMT ref: 00560F3C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                              • String ID: S\$ S\$8S\$8S\$Access Level: $Administrator$C:\Users\user\Desktop\tu.exe$Exe$Inj$PS\$Remcos Agent initialized$Software\$User$dM\$del$del$exepath$licence$license_code.txt$P\$P\$P\$P\$P\$P\$P\$P\$P\$P\$P\$P\$P\$P\$P\
                                                              • API String ID: 2830904901-2347464508
                                                              • Opcode ID: 750edafc8c72c9a364ce49edbcd197d8153bc695de9d03496066375bb76919b1
                                                              • Instruction ID: e0b1d6631fe4013f52982908bcfa772224e5c6029ce2f96bc2e8919080f444d7
                                                              • Opcode Fuzzy Hash: 750edafc8c72c9a364ce49edbcd197d8153bc695de9d03496066375bb76919b1
                                                              • Instruction Fuzzy Hash: 49329560B04A426ADB18B7B09C7FF6E2E997FC1742F40082FBD425B1D2EE649D4D8365
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 448 564f2a-564f72 call 5520df call 56b8b3 call 5520df call 551e65 call 551fab call 58baac 461 564f74-564f7b Sleep 448->461 462 564f81-564fcd call 552093 call 551e65 call 5520f6 call 56be1b call 55489e call 551e65 call 55b9bd 448->462 461->462 477 565041-5650dc call 552093 call 551e65 call 5520f6 call 56be1b call 551e65 * 2 call 556c1e call 552f10 call 551fe2 call 551fd8 * 2 call 551e65 call 555b05 462->477 478 564fcf-56503e call 551e65 call 55247c call 551e65 call 551fab call 551e65 call 55247c call 551e65 call 551fab call 551e65 call 55247c call 551e65 call 551fab call 55473d 462->478 531 5650de-5650ea 477->531 532 5650ec-5650f3 477->532 478->477 533 5650f8-56518a call 555aa6 call 55531e call 556383 call 552f10 call 552093 call 56b4ef call 551fd8 * 2 call 551e65 call 551fab call 551e65 call 551fab call 564ee9 531->533 532->533 560 5651d5-5651e3 call 55482d 533->560 561 56518c-5651d0 WSAGetLastError call 56cae1 call 5552fd call 552093 call 56b4ef call 551fd8 533->561 566 5651e5-56520b call 552093 * 2 call 56b4ef 560->566 567 565210-565225 call 554f51 call 5548c8 560->567 582 565aa3-565ab5 call 554e26 call 5521fa 561->582 566->582 567->582 583 56522b-56537e call 551e65 * 2 call 55531e call 556383 call 552f10 call 556383 call 552f10 call 552093 call 56b4ef call 551fd8 * 4 call 56b7e0 call 5645bd call 55905c call 591e81 call 551e65 call 5520f6 call 55247c call 551fab * 2 call 5636f8 567->583 597 565ab7-565ad7 call 551e65 call 551fab call 58baac Sleep 582->597 598 565add-565ae5 call 551e8d 582->598 648 565392-5653b9 call 551fab call 5635a6 583->648 649 565380-56538d call 555aa6 583->649 597->598 598->477 655 5653c0-56577f call 55417e call 55dd89 call 56bc42 call 56bd1e call 56bb8e call 551e65 GetTickCount call 56bb8e call 56bae6 call 56bb8e * 2 call 56ba96 call 56bd1e * 5 call 55f8d1 call 56bd1e call 552f31 call 552ea1 call 552f10 call 552ea1 call 552f10 * 3 call 552ea1 call 552f10 call 556383 call 552f10 call 556383 call 552f10 call 552ea1 call 552f10 call 552ea1 call 552f10 call 552ea1 call 552f10 call 552ea1 call 552f10 call 552ea1 call 552f10 call 552ea1 call 552f10 call 552ea1 call 552f10 call 556383 call 552f10 * 5 call 552ea1 call 552f10 call 552ea1 call 552f10 * 7 call 552ea1 648->655 656 5653bb-5653bd 648->656 649->648 782 565781 call 554aa1 655->782 656->655 783 565786-565a0a call 551fd8 * 50 call 551f09 call 551fd8 * 6 call 551f09 call 554c10 782->783 901 565a0f-565a16 783->901 902 565a2a-565a31 901->902 903 565a18-565a1f 901->903 905 565a33-565a38 call 55b051 902->905 906 565a3d-565a6f call 555a6b call 552093 * 2 call 56b4ef 902->906 903->902 904 565a21-565a23 903->904 904->902 905->906 917 565a83-565a9e call 551fd8 * 2 call 551f09 906->917 918 565a71-565a7d CreateThread 906->918 917->582 918->917
                                                              APIs
                                                              • Sleep.KERNEL32(00000000,00000029,005C52F0,005C50E4,00000000), ref: 00564F7B
                                                              • WSAGetLastError.WS2_32(00000000,00000001), ref: 0056518C
                                                              • Sleep.KERNEL32(00000000,00000002), ref: 00565AD7
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Sleep$ErrorLastLocalTime
                                                              • String ID: | $%I64u$4.9.4 Pro$8S\$C:\Users\user\Desktop\tu.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PS\$TLS Off$TLS On $dM\$hlight$name$N\$N\$P\$P\$P\
                                                              • API String ID: 524882891-2418888176
                                                              • Opcode ID: 27a36eb68890ad90277cca25c22729183c7c0e12446431b8ff8e6cc8ab34aa21
                                                              • Instruction ID: 0b0ed289875e0a33f0655341b31b68f036d51e709ef184423188acec5e0315f1
                                                              • Opcode Fuzzy Hash: 27a36eb68890ad90277cca25c22729183c7c0e12446431b8ff8e6cc8ab34aa21
                                                              • Instruction Fuzzy Hash: 1C526E31A005165ADB18F761EC6BBFE7F75BF90302F5045AAA806671D2EF301E8ACA54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • Sleep.KERNEL32(00001388), ref: 0055A740
                                                                • Part of subcall function 0055A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0055A74D), ref: 0055A6AB
                                                                • Part of subcall function 0055A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0055A74D), ref: 0055A6BA
                                                                • Part of subcall function 0055A675: Sleep.KERNEL32(00002710,?,?,?,0055A74D), ref: 0055A6E7
                                                                • Part of subcall function 0055A675: FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0055A74D), ref: 0055A6EE
                                                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0055A77C
                                                              • GetFileAttributesW.KERNEL32(00000000), ref: 0055A78D
                                                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0055A7A4
                                                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0055A81E
                                                                • Part of subcall function 0056C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0055A843), ref: 0056C49E
                                                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,005B6468,?,00000000,00000000,00000000,00000000,00000000), ref: 0055A927
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$AttributesCreate$Sleep$ChangeCloseDirectoryExistsFindNotificationPathSize
                                                              • String ID: 8S\$8S\$pQ\$pQ\$P\$P\
                                                              • API String ID: 110482706-251329498
                                                              • Opcode ID: 85566b9af313360fd33075959a946e62766eeaa51d3b7d25cf395f8a8214e128
                                                              • Instruction ID: 0ffca2403cd51f9554794e7abb74cd168f2641ebea564f6204b5059cf4a473d2
                                                              • Opcode Fuzzy Hash: 85566b9af313360fd33075959a946e62766eeaa51d3b7d25cf395f8a8214e128
                                                              • Instruction Fuzzy Hash: 82516E712046025ACB04BB70D87ABBE7EA9BFD5342F04092EBD82971D2EF149D0D8766
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1023 5548c8-5548e8 connect 1024 5548ee-5548f1 1023->1024 1025 554a1b-554a1f 1023->1025 1026 554a17-554a19 1024->1026 1027 5548f7-5548fa 1024->1027 1028 554a97 1025->1028 1029 554a21-554a2f WSAGetLastError 1025->1029 1030 554a99-554a9e 1026->1030 1031 554926-554930 call 570c60 1027->1031 1032 5548fc-554923 call 55531e call 552093 call 56b4ef 1027->1032 1028->1030 1029->1028 1033 554a31-554a34 1029->1033 1042 554941-55494e call 570e8f 1031->1042 1043 554932-55493c 1031->1043 1032->1031 1036 554a36-554a6f call 56cae1 call 5552fd call 552093 call 56b4ef call 551fd8 1033->1036 1037 554a71-554a76 1033->1037 1036->1028 1039 554a7b-554a94 call 552093 * 2 call 56b4ef 1037->1039 1039->1028 1056 554987-554992 call 571a40 1042->1056 1057 554950-554973 call 552093 * 2 call 56b4ef 1042->1057 1043->1039 1069 5549c4-5549d1 call 570e06 1056->1069 1070 554994-5549c2 call 552093 * 2 call 56b4ef call 5710b2 1056->1070 1086 554976-554982 call 570ca0 1057->1086 1080 5549d3-5549f6 call 552093 * 2 call 56b4ef 1069->1080 1081 5549f9-554a14 CreateEventW * 2 1069->1081 1070->1086 1080->1081 1081->1026 1086->1028
                                                              APIs
                                                              • connect.WS2_32(?,?,?), ref: 005548E0
                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00554A00
                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00554A0E
                                                              • WSAGetLastError.WS2_32 ref: 00554A21
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                              • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                              • API String ID: 994465650-2151626615
                                                              • Opcode ID: a7a8afcdcce2baeba6d079a31a1ed4cf6b67511c10d5f9eb79efa661ae6e0ab9
                                                              • Instruction ID: 3448c42b8c510d7bf96b6bb8914170347b8932f377f04d4257d0c3c40806a7b4
                                                              • Opcode Fuzzy Hash: a7a8afcdcce2baeba6d079a31a1ed4cf6b67511c10d5f9eb79efa661ae6e0ab9
                                                              • Instruction Fuzzy Hash: D041EB65B406076B9A187B79C92F97DBE56BB82305B40011AFC0247AD3FF11AC59CBD3
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              • __Init_thread_footer.LIBCMT ref: 0055AD38
                                                              • Sleep.KERNEL32(000001F4), ref: 0055AD43
                                                              • GetForegroundWindow.USER32 ref: 0055AD49
                                                              • GetWindowTextLengthW.USER32(00000000), ref: 0055AD52
                                                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0055AD86
                                                              • Sleep.KERNEL32(000003E8), ref: 0055AE54
                                                                • Part of subcall function 0055A636: SetEvent.KERNEL32(?,?,00000000,0055B20A,00000000), ref: 0055A662
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                              • String ID: [${ User has been idle for $ minutes }$]
                                                              • API String ID: 911427763-3954389425
                                                              • Opcode ID: 30c0697e0159ca2c5b628199ff9fc495ac4d9b6b4647014acb34603a24dae964
                                                              • Instruction ID: 19592cf425a7f6ccb25b0095f243e5dd316a1aa984682d2e2d5fe2b1c7da58fe
                                                              • Opcode Fuzzy Hash: 30c0697e0159ca2c5b628199ff9fc495ac4d9b6b4647014acb34603a24dae964
                                                              • Instruction Fuzzy Hash: 465193316046425BD714F760D86AA6E7FA9BFD4302F400A2BFC46931E2EF249E4DC653
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1178 55da34-55da59 call 551f86 1181 55db83-55dba9 call 551f04 GetLongPathNameW call 55417e 1178->1181 1182 55da5f 1178->1182 1206 55dbae-55dc1b call 55417e call 55ddd1 call 552fa5 * 2 call 551f09 * 5 1181->1206 1184 55daa5-55daac call 56bfb7 1182->1184 1185 55da66-55da6b 1182->1185 1186 55da91-55da96 1182->1186 1187 55db51-55db56 1182->1187 1188 55da70-55da7e call 56b5b4 call 551f13 1182->1188 1189 55db5f-55db6c call 58c0cf 1182->1189 1190 55db6e 1182->1190 1191 55db58-55db5d 1182->1191 1192 55da9b-55daa0 1182->1192 1207 55db00-55db4c call 55417e call 58c0cf call 55417e call 552fa5 call 551f13 call 551f09 * 2 1184->1207 1208 55daae-55dafe call 55417e call 58c0cf call 55417e call 552fa5 call 551f13 call 551f09 * 2 1184->1208 1193 55db73-55db78 call 58c0cf 1185->1193 1186->1193 1187->1193 1209 55da83 1188->1209 1189->1190 1203 55db79-55db7e call 559057 1189->1203 1190->1193 1191->1193 1192->1193 1193->1203 1203->1181 1207->1209 1214 55da87-55da8c call 551f09 1208->1214 1209->1214 1214->1181
                                                              APIs
                                                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0055DB9A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LongNamePath
                                                              • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                              • API String ID: 82841172-425784914
                                                              • Opcode ID: f43427ddc181c1f48384920502cbdb76f571864092b5d878ae6add96703ae5c5
                                                              • Instruction ID: 545b32b27c06a31bbfaec89b97944373644146e6ca6cef3b5ac86cf3ed69635d
                                                              • Opcode Fuzzy Hash: f43427ddc181c1f48384920502cbdb76f571864092b5d878ae6add96703ae5c5
                                                              • Instruction Fuzzy Hash: C94115321086069BC214FA60DC7ADAFBFB9BED5352F10051FB846921D1FF60A94DCA66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1313 56b2c3-56b31a call 56bfb7 call 5635a6 call 551fe2 call 551fd8 call 556ae1 1324 56b31c-56b32b call 5635a6 1313->1324 1325 56b35d-56b366 1313->1325 1329 56b330-56b347 call 551fab StrToIntA 1324->1329 1327 56b36f 1325->1327 1328 56b368-56b36d 1325->1328 1330 56b374-56b37f call 55537d 1327->1330 1328->1330 1335 56b355-56b358 call 551fd8 1329->1335 1336 56b349-56b352 call 56cf69 1329->1336 1335->1325 1336->1335
                                                              APIs
                                                                • Part of subcall function 0056BFB7: GetCurrentProcess.KERNEL32(?,?,?,0055DAAA,WinDir,00000000,00000000), ref: 0056BFC8
                                                                • Part of subcall function 005635A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 005635CA
                                                                • Part of subcall function 005635A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 005635E7
                                                                • Part of subcall function 005635A6: RegCloseKey.KERNEL32(?), ref: 005635F2
                                                              • StrToIntA.SHLWAPI(00000000,005BC9F8,00000000,00000000,00000000,005C50E4,00000003,Exe,00000000,0000000E,00000000,005B60BC,00000003,00000000), ref: 0056B33C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCurrentOpenProcessQueryValue
                                                              • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                              • API String ID: 1866151309-2070987746
                                                              • Opcode ID: 0fcc6b1de7b15f07718396813814cabafd7acc857866fdb35cc92039bd7ac224
                                                              • Instruction ID: b0db8e6dcaa46b52a7cd2dceb405228c738567387ba3da027adee008aab90c5e
                                                              • Opcode Fuzzy Hash: 0fcc6b1de7b15f07718396813814cabafd7acc857866fdb35cc92039bd7ac224
                                                              • Instruction Fuzzy Hash: 4A115921B406021AE700B378DC6FEBE7F59BBE0301F440525F902A31D2EB506D89C3A9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1387 55a675-55a685 1388 55a722-55a725 1387->1388 1389 55a68b-55a68d 1387->1389 1390 55a690-55a6b6 call 551f04 CreateFileW 1389->1390 1393 55a6f6 1390->1393 1394 55a6b8-55a6c6 GetFileSize 1390->1394 1397 55a6f9-55a6fd 1393->1397 1395 55a6ed-55a6f4 FindCloseChangeNotification 1394->1395 1396 55a6c8 1394->1396 1395->1397 1398 55a6d2-55a6d9 1396->1398 1399 55a6ca-55a6d0 1396->1399 1397->1390 1400 55a6ff-55a702 1397->1400 1401 55a6e2-55a6e7 Sleep 1398->1401 1402 55a6db-55a6dd call 55b0dc 1398->1402 1399->1395 1399->1398 1400->1388 1403 55a704-55a70b 1400->1403 1401->1395 1402->1401 1403->1388 1404 55a70d-55a71d call 55905c call 55a179 1403->1404 1404->1388
                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0055A74D), ref: 0055A6AB
                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0055A74D), ref: 0055A6BA
                                                              • Sleep.KERNEL32(00002710,?,?,?,0055A74D), ref: 0055A6E7
                                                              • FindCloseChangeNotification.KERNEL32(00000000,?,?,?,0055A74D), ref: 0055A6EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$ChangeCloseCreateFindNotificationSizeSleep
                                                              • String ID: XQ\
                                                              • API String ID: 4068920109-1553192912
                                                              • Opcode ID: 28ea3272ecbfa793abc0ff2b88e5fc5f7fa7fbf381a1ae5402acbb3201500b59
                                                              • Instruction ID: 280bd2448272736948b83b0eb80c466883409040ebd8fa6c38e98a506eb40328
                                                              • Opcode Fuzzy Hash: 28ea3272ecbfa793abc0ff2b88e5fc5f7fa7fbf381a1ae5402acbb3201500b59
                                                              • Instruction Fuzzy Hash: 1E113A30640B50AEEA3167A498BDB2E3FAABF55352F0C050AFA8246592D7506C8CD366
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1409 56c3f1-56c402 1410 56c404-56c407 1409->1410 1411 56c41a-56c421 1409->1411 1412 56c410-56c418 1410->1412 1413 56c409-56c40e 1410->1413 1414 56c422-56c43b CreateFileW 1411->1414 1412->1414 1413->1414 1415 56c441-56c446 1414->1415 1416 56c43d-56c43f 1414->1416 1418 56c461-56c472 WriteFile 1415->1418 1419 56c448-56c456 SetFilePointer 1415->1419 1417 56c47f-56c484 1416->1417 1420 56c476-56c47d FindCloseChangeNotification 1418->1420 1421 56c474 1418->1421 1419->1418 1422 56c458-56c45f CloseHandle 1419->1422 1420->1417 1421->1420 1422->1416
                                                              APIs
                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0056C510,00000000,00000000,?), ref: 0056C430
                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0055A8E7,?,00000000,00000000), ref: 0056C44D
                                                              • CloseHandle.KERNEL32(00000000,?,0055A8E7,?,00000000,00000000), ref: 0056C459
                                                              • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0055A8E7,?,00000000,00000000), ref: 0056C46A
                                                              • FindCloseChangeNotification.KERNEL32(00000000,?,0055A8E7,?,00000000,00000000), ref: 0056C477
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Close$ChangeCreateFindHandleNotificationPointerWrite
                                                              • String ID:
                                                              • API String ID: 1087594267-0
                                                              • Opcode ID: 77e1c333d7fad135d058250766cbcfe2120c62d0efd4a9bbdd23364c63b0978c
                                                              • Instruction ID: 2d2fb95afc742898f96f9f032296152c814f2687582729790bb39cef2015012a
                                                              • Opcode Fuzzy Hash: 77e1c333d7fad135d058250766cbcfe2120c62d0efd4a9bbdd23364c63b0978c
                                                              • Instruction Fuzzy Hash: 4011A5712051257FEE148A25AC99EBB7FACFB56777F104A29F5D2C31C0CA619C049631
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CountEventTick
                                                              • String ID: !DU$N\
                                                              • API String ID: 180926312-498127804
                                                              • Opcode ID: f54c7c05242bda60770f94c2ef3fa1a0fe07c5b9cc10c1b5adf4f67988b20a0d
                                                              • Instruction ID: 511e9b8751dcdfcc2378847209229d30bfc67b4d7683e05c699e025d11809172
                                                              • Opcode Fuzzy Hash: f54c7c05242bda60770f94c2ef3fa1a0fe07c5b9cc10c1b5adf4f67988b20a0d
                                                              • Instruction Fuzzy Hash: A751C1316086025AC724FB20D8AAAEF7FA5BFD1311F50492EB846871D1EF30594ECB96
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateThread.KERNEL32(00000000,00000000,0055A27D,?,00000000,00000000), ref: 0055A1FE
                                                              • CreateThread.KERNEL32(00000000,00000000,0055A267,?,00000000,00000000), ref: 0055A20E
                                                              • CreateThread.KERNEL32(00000000,00000000,0055A289,?,00000000,00000000), ref: 0055A21A
                                                                • Part of subcall function 0055B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0055B172
                                                                • Part of subcall function 0055B164: wsprintfW.USER32 ref: 0055B1F3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateThread$LocalTimewsprintf
                                                              • String ID: Offline Keylogger Started
                                                              • API String ID: 465354869-4114347211
                                                              • Opcode ID: 26de8c01eed5994cdbc969d2930dcee02b22c7a5bd98cb9a7b948dda39b98e2c
                                                              • Instruction ID: 2758f3ef9e88b5c8890d7786b2cc2a14d429d6dcbc1c91ecf156bd7d4574d3e8
                                                              • Opcode Fuzzy Hash: 26de8c01eed5994cdbc969d2930dcee02b22c7a5bd98cb9a7b948dda39b98e2c
                                                              • Instruction Fuzzy Hash: AC1158A51006097AA224BB359CAFCBB7E5DFEC1795F40061AFC4603192EA515D5CCBF3
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLocalTime.KERNEL32(00000001,005C4EE0,005C5598,?,?,?,?,00565CD6,?,00000001), ref: 00554F81
                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,005C4EE0,005C5598,?,?,?,?,00565CD6,?,00000001), ref: 00554FCD
                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00554FE0
                                                              Strings
                                                              • KeepAlive | Enabled | Timeout: , xrefs: 00554F94
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Create$EventLocalThreadTime
                                                              • String ID: KeepAlive | Enabled | Timeout:
                                                              • API String ID: 2532271599-1507639952
                                                              • Opcode ID: 73dbfeec77fce8e8b2f07144b8820eef61ce8ccb41d50d57446a5ef14af89f68
                                                              • Instruction ID: fc12f9982812348244512fe3218b6feeab18c99f6b2fb3bec1482f16cc28f8c1
                                                              • Opcode Fuzzy Hash: 73dbfeec77fce8e8b2f07144b8820eef61ce8ccb41d50d57446a5ef14af89f68
                                                              • Instruction Fuzzy Hash: DA11E3358046846ADB20A77A9C1EFAB7FB8AFD3715F04040FF84143251D6705489CBB2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0056377E
                                                              • RegSetValueExA.KERNEL32(?,005B74B8,00000000,?,00000000,00000000,005C52F0,?,?,0055F853,005B74B8,4.9.4 Pro), ref: 005637A6
                                                              • RegCloseKey.KERNEL32(?,?,?,0055F853,005B74B8,4.9.4 Pro), ref: 005637B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateValue
                                                              • String ID: pth_unenc
                                                              • API String ID: 1818849710-4028850238
                                                              • Opcode ID: 0497f4e62890003a3d0e62ef0918abe2c7e52c70f7add94e6a5fdaca5d8fdc20
                                                              • Instruction ID: e2c61d0cbe5556bf5905b69efbafce50cfee12af177397bc346fe0e37c48c568
                                                              • Opcode Fuzzy Hash: 0497f4e62890003a3d0e62ef0918abe2c7e52c70f7add94e6a5fdaca5d8fdc20
                                                              • Instruction Fuzzy Hash: B1F06DB2400118BFCF00AFA0EC59EEA3F6CFF45791F104155BE05A6021EB319F18ABA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,005C4F50), ref: 00554DB3
                                                              • CreateThread.KERNEL32(00000000,00000000,?,005C4EF8,00000000,00000000), ref: 00554DC7
                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00554DD2
                                                              • FindCloseChangeNotification.KERNEL32(?,?,00000000), ref: 00554DDB
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Create$ChangeCloseEventFindNotificationObjectSingleThreadWait
                                                              • String ID:
                                                              • API String ID: 2579639479-0
                                                              • Opcode ID: 25628e283c2893243474b52493f74ab6599a5b0158d193e88a7c61a6033901a8
                                                              • Instruction ID: ac5713cb2b27a0efd451c77aa7ad3c2968effbd089c1f543b9594a125bfccde3
                                                              • Opcode Fuzzy Hash: 25628e283c2893243474b52493f74ab6599a5b0158d193e88a7c61a6033901a8
                                                              • Instruction Fuzzy Hash: A7418271508302ABCB14AB61CC69E7FBFA9BFD5316F04091EFC9282191DB20994D8B62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,0055EC08,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,005B60BC,00000003,00000000), ref: 0055D078
                                                              • GetLastError.KERNEL32 ref: 0055D083
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateErrorLastMutex
                                                              • String ID: S\
                                                              • API String ID: 1925916568-877104314
                                                              • Opcode ID: 8af12a3d896dd1cfe152ebdc8764552cdcc25eeda18c57438dee76ebe9be44b5
                                                              • Instruction ID: 487d60c722b963200450078d06e706b45e34d23b13894ee1b4e2bc0df572b1a2
                                                              • Opcode Fuzzy Hash: 8af12a3d896dd1cfe152ebdc8764552cdcc25eeda18c57438dee76ebe9be44b5
                                                              • Instruction Fuzzy Hash: 32D012B4604611AFD7081BB49C99B583D94EF64702F400429B507C99E0DBA44898A611
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 005635CA
                                                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 005635E7
                                                              • RegCloseKey.KERNEL32(?), ref: 005635F2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID:
                                                              • API String ID: 3677997916-0
                                                              • Opcode ID: 958a30f86c1af014d8b35120b7ce9eb823dbf4387ebfd5368ba3c43b54610fe5
                                                              • Instruction ID: 963f2fe8baa36c2874cead38feccc5bbe822ae130d0c7b6e9d93ca899c84041d
                                                              • Opcode Fuzzy Hash: 958a30f86c1af014d8b35120b7ce9eb823dbf4387ebfd5368ba3c43b54610fe5
                                                              • Instruction Fuzzy Hash: 9B01627A900128BBCB209B95DD09DEE7F7DEB85750F004195BB05E3210DB719E19DBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,005C52F0), ref: 00563714
                                                              • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0056372D
                                                              • RegCloseKey.KERNEL32(00000000), ref: 00563738
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID:
                                                              • API String ID: 3677997916-0
                                                              • Opcode ID: f0156d184192e1d768dc04df5fc22ec0c42c1b8e78ed95e79090e6425dbd6a85
                                                              • Instruction ID: e168d6ed2bc62258f26635e30bd8752ee6c1c9e02d300ec33598e577122bc761
                                                              • Opcode Fuzzy Hash: f0156d184192e1d768dc04df5fc22ec0c42c1b8e78ed95e79090e6425dbd6a85
                                                              • Instruction Fuzzy Hash: F701FBB540012DBBCF215FA5DC49DEA7F79FF16751F004565BE0862120D7318AA9EBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00563569
                                                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,005C52F0), ref: 00563587
                                                              • RegCloseKey.KERNEL32(?), ref: 00563592
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID:
                                                              • API String ID: 3677997916-0
                                                              • Opcode ID: 9fa1605136ee50f7bc7b376b21530fe3d5a02c67b43f06c497912ccb46b70488
                                                              • Instruction ID: edac477c2534e7232af4adae92a9f2d1007c1e0d7ff65014e970ea1dfaac545d
                                                              • Opcode Fuzzy Hash: 9fa1605136ee50f7bc7b376b21530fe3d5a02c67b43f06c497912ccb46b70488
                                                              • Instruction Fuzzy Hash: A6F01776900218FFDF109FA19C09FEEBBBCEB55750F1080A5BA05E6150E6715B18AB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0055C19C,005B6C48), ref: 00563516
                                                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0055C19C,005B6C48), ref: 0056352A
                                                              • RegCloseKey.KERNEL32(?,?,?,0055C19C,005B6C48), ref: 00563535
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseOpenQueryValue
                                                              • String ID:
                                                              • API String ID: 3677997916-0
                                                              • Opcode ID: f59f72934ba60ac74aac9e1ba059229c24dfff3d18cb22cdbd111b219b6a0d5c
                                                              • Instruction ID: 6a68fc39dfd371ec202e29d9dbb69887c4611b8c15e8eeed7fc2a63a33db874f
                                                              • Opcode Fuzzy Hash: f59f72934ba60ac74aac9e1ba059229c24dfff3d18cb22cdbd111b219b6a0d5c
                                                              • Instruction Fuzzy Hash: 07E06D72801238FB9F204BA29C0DDEB7F6CFF56BE0B014144BD0DA6111D2614E14E6E0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegCreateKeyA.ADVAPI32(80000001,00000000,005B60A4), ref: 00563885
                                                              • RegSetValueExA.KERNEL32(005B60A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0055C152,005B6C48,00000001,000000AF,005B60A4), ref: 005638A0
                                                              • RegCloseKey.ADVAPI32(005B60A4,?,?,?,0055C152,005B6C48,00000001,000000AF,005B60A4), ref: 005638AB
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateValue
                                                              • String ID:
                                                              • API String ID: 1818849710-0
                                                              • Opcode ID: d95a9311aaf8ed1a9f717677615ad8ab4a80909bbddd8867c1187326f69437c1
                                                              • Instruction ID: 12ef8974848068367085b69259a760f77c98ea61825d1db54c67ec53aacbf962
                                                              • Opcode Fuzzy Hash: d95a9311aaf8ed1a9f717677615ad8ab4a80909bbddd8867c1187326f69437c1
                                                              • Instruction Fuzzy Hash: 27E06D72500228FBEF119FA19C09FEA7B6CFF15B90F104154BF05A7150D3718E18A7A0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _wcslen
                                                              • String ID: pQ\
                                                              • API String ID: 176396367-1791869064
                                                              • Opcode ID: 4754e916d40091b3ecb1249fe725c368338f1a7575d8379d0bddf92142ad085c
                                                              • Instruction ID: 0ec688c592182b4e41690510389e024b4131b9f12da79a2148f5efd3f964c993
                                                              • Opcode Fuzzy Hash: 4754e916d40091b3ecb1249fe725c368338f1a7575d8379d0bddf92142ad085c
                                                              • Instruction Fuzzy Hash: A611A1319006068FCB15EF64E86AAEF7FB9BF94311B04001BFC4652291FF24A909CB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 0056B7CA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID: @
                                                              • API String ID: 1890195054-2766056989
                                                              • Opcode ID: d55c5c354112fa23abbcc34c8e180aa706aabfb71751e0bc4b0a545af847a6c2
                                                              • Instruction ID: 571dfcd8e9666550bafe91e62de88c7332d3c7a9a482069338ff1d5d0a8e71aa
                                                              • Opcode Fuzzy Hash: d55c5c354112fa23abbcc34c8e180aa706aabfb71751e0bc4b0a545af847a6c2
                                                              • Instruction Fuzzy Hash: 87D017B9802318AFC720DFA8E804A8DBBFCFB08210F00416AEC49E3700E770A8048B84
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _free.LIBCMT ref: 005961A6
                                                                • Part of subcall function 00596137: RtlAllocateHeap.NTDLL(00000000,0058529C,?,?,00588847,?,?,00000000,?,?,0055DE62,0058529C,?,?,?,?), ref: 00596169
                                                              • HeapReAlloc.KERNEL32(00000000,00000000,?,?,0000000F,00000000,00582F02,00000000,0000000F,0057F90C,?,?,005819B3,?,?,00000000), ref: 005961E2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocAllocate_free
                                                              • String ID:
                                                              • API String ID: 2447670028-0
                                                              • Opcode ID: a6eb0b06de6fdeafd850ac81c4644fc6f854f6a0c8ed0296f6d9259aa70b40d3
                                                              • Instruction ID: 723c30323d45aa1e673d6b864eaeca75069112641fc6522ffed3d13796e722a5
                                                              • Opcode Fuzzy Hash: a6eb0b06de6fdeafd850ac81c4644fc6f854f6a0c8ed0296f6d9259aa70b40d3
                                                              • Instruction Fuzzy Hash: 9AF090326016167ADF212B29AC05F6F7F5DBFC17B1F21412AF824A61D2DE24D919F1A0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • socket.WS2_32(?,00000001,00000006), ref: 00554852
                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0055530B,?,?,00000000,00000000,?,?,00000000,00555208,?,00000000), ref: 0055488E
                                                                • Part of subcall function 0055489E: WSAStartup.WS2_32(00000202,00000000), ref: 005548B3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CreateEventStartupsocket
                                                              • String ID:
                                                              • API String ID: 1953588214-0
                                                              • Opcode ID: 66ca464d6a223a08e0ddcbe90c0b428799524fdb8758e3a59b61ba2dbca26293
                                                              • Instruction ID: 6a949a7ac497e5fcae0a6e21514beff1752a1b4cfe20ff74a9cc189d474d8857
                                                              • Opcode Fuzzy Hash: 66ca464d6a223a08e0ddcbe90c0b428799524fdb8758e3a59b61ba2dbca26293
                                                              • Instruction Fuzzy Hash: 22017C71408B909ED7398F28A8457867FE0BB29308F04495EF4D697BA1C3B1A489DF10
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                              • Instruction ID: c783b0b58c40f7cedf0a9d0e4c1f9095b59fdeb8978c125fb4ceca7d64efae44
                                                              • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                              • Instruction Fuzzy Hash: A6F0547060560299DB1C9A348464B297E957B84352F248A1EF85AD58D1D730C899C708
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetForegroundWindow.USER32 ref: 0056BAB8
                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0056BACB
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Window$ForegroundText
                                                              • String ID:
                                                              • API String ID: 29597999-0
                                                              • Opcode ID: 45368537794541ef3a15541fe08f3a74d65ad512acacc69c646805b3380bb941
                                                              • Instruction ID: 03292c0fb009280a862cee2b157a9b33dd8996172face8f07bb15e7f44593416
                                                              • Opcode Fuzzy Hash: 45368537794541ef3a15541fe08f3a74d65ad512acacc69c646805b3380bb941
                                                              • Instruction Fuzzy Hash: 40E0D875A0032827EB20A7A4DC4EFE67B7CFB04700F00009AB918D31C2E9B06948CBE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • getaddrinfo.WS2_32(00000000,00000000,00000000,005C2ADC,005C50E4,00000000,00565188,00000000,00000001), ref: 00564F0B
                                                              • WSASetLastError.WS2_32(00000000), ref: 00564F10
                                                                • Part of subcall function 00564D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00564DD5
                                                                • Part of subcall function 00564D86: LoadLibraryA.KERNEL32(?), ref: 00564E17
                                                                • Part of subcall function 00564D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00564E37
                                                                • Part of subcall function 00564D86: FreeLibrary.KERNEL32(00000000), ref: 00564E3E
                                                                • Part of subcall function 00564D86: LoadLibraryA.KERNEL32(?), ref: 00564E76
                                                                • Part of subcall function 00564D86: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00564E88
                                                                • Part of subcall function 00564D86: FreeLibrary.KERNEL32(00000000), ref: 00564E8F
                                                                • Part of subcall function 00564D86: GetProcAddress.KERNEL32(00000000,?), ref: 00564E9E
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                              • String ID:
                                                              • API String ID: 1170566393-0
                                                              • Opcode ID: f0b2e9fa550fa70e8273bfc6514c8608b507619167cf62bb52c2dffd51360ab3
                                                              • Instruction ID: 3d6fb13b9b7755033475b56bc2e227d7c11f468f6e6987cb1a4c3c2fc6164085
                                                              • Opcode Fuzzy Hash: f0b2e9fa550fa70e8273bfc6514c8608b507619167cf62bb52c2dffd51360ab3
                                                              • Instruction Fuzzy Hash: F4D05E326015316F9360A76DAC05FBBEEACFFE7B74B05002AF900D3210D6908D4697A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CallNextHookEx.USER32(005C50F0,?,?,?), ref: 0055A3D2
                                                                • Part of subcall function 0055B646: GetKeyState.USER32(00000011), ref: 0055B64B
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CallHookNextState
                                                              • String ID:
                                                              • API String ID: 3280314413-0
                                                              • Opcode ID: 3daec43c4e19d1d1325ea4b05503ef1ae8817b26ec1e089e6593aec27c91a773
                                                              • Instruction ID: 605866afc6ef5102bff89124aca75e47825067ad0ab893bf257b6fc7226781db
                                                              • Opcode Fuzzy Hash: 3daec43c4e19d1d1325ea4b05503ef1ae8817b26ec1e089e6593aec27c91a773
                                                              • Instruction Fuzzy Hash: D4F0A2722042069AEA14AEA89CBCC2EBF55FFD531AF210D2BBC0246952CA61D80C9612
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000000,0058529C,?,?,00588847,?,?,00000000,?,?,0055DE62,0058529C,?,?,?,?), ref: 00596169
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: bc86b077ca4a42df8ccfae7bd8e8435cab14ea6a7306487a0e36dc2ffee2d712
                                                              • Instruction ID: e5ff273f6ce95f0ca09021053314bee0446a5b64a0edd924b587191321f556ba
                                                              • Opcode Fuzzy Hash: bc86b077ca4a42df8ccfae7bd8e8435cab14ea6a7306487a0e36dc2ffee2d712
                                                              • Instruction Fuzzy Hash: 55E06D321016267ADF2226659C09B5B7E5DBB823A1F191125EC15960D6DF60CC08F2E1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WSAStartup.WS2_32(00000202,00000000), ref: 005548B3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Startup
                                                              • String ID:
                                                              • API String ID: 724789610-0
                                                              • Opcode ID: 6de7d39e4de00c7ed5f9abadb75be506680e82d9b3d3c8ebf804fd9c9c239d18
                                                              • Instruction ID: c5834f609789ed15c88504ea41a6502cd07d1e7601f1e2c5c47d4007e228aef5
                                                              • Opcode Fuzzy Hash: 6de7d39e4de00c7ed5f9abadb75be506680e82d9b3d3c8ebf804fd9c9c239d18
                                                              • Instruction Fuzzy Hash: 19D0123255861C4EE620AAB4AC0FCE4775CD327615F0007AA6CB5C35D2E680171DD2B7
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: send
                                                              • String ID:
                                                              • API String ID: 2809346765-0
                                                              • Opcode ID: 0ab9937e7feeab9fe2ee0017ab60946f159ec0345e4e600026ad904a6f8c51a4
                                                              • Instruction ID: bc527700370bdf1bda3206aa3347b993f0915e79ee5fb946c653ee730549186c
                                                              • Opcode Fuzzy Hash: 0ab9937e7feeab9fe2ee0017ab60946f159ec0345e4e600026ad904a6f8c51a4
                                                              • Instruction Fuzzy Hash: E0B09279118202FF8F050B60CC1487A7EAAFBCD381F008E0CB58740130C6328454AB21
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: recv
                                                              • String ID:
                                                              • API String ID: 1507349165-0
                                                              • Opcode ID: a3974f3f98d858d3c61f52d59c7d724ed1b61f480ba97e3d0f889e8b6ac298ab
                                                              • Instruction ID: 21bbbea1336bff3a6726632505c94164af816b677cb002ae1a9dd9a6569aa4ac
                                                              • Opcode Fuzzy Hash: a3974f3f98d858d3c61f52d59c7d724ed1b61f480ba97e3d0f889e8b6ac298ab
                                                              • Instruction Fuzzy Hash: FFB09279118202FF8E050B60DC148AA7EA6FBCD391F008C0CB58641230C6328494AB22
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ___getlocaleinfo
                                                              • String ID:
                                                              • API String ID: 1937885557-0
                                                              • Opcode ID: 51dcb22c4dc93a7f30a99e81a1e24136c466f284c556936e1c7157a4ebd90518
                                                              • Instruction ID: fd67e2181e606d744a6158f7a2df29ca0b8827f53dc611e391066ddd0200f471
                                                              • Opcode Fuzzy Hash: 51dcb22c4dc93a7f30a99e81a1e24136c466f284c556936e1c7157a4ebd90518
                                                              • Instruction Fuzzy Hash: 1AE112B294060EBEEF11DAF1CC85DFF77BDEF48348F00496AB216D6040EA74AA159760
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetEvent.KERNEL32(?,?), ref: 00557CB9
                                                              • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00557D87
                                                              • DeleteFileW.KERNEL32(00000000), ref: 00557DA9
                                                                • Part of subcall function 0056C291: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C2EC
                                                                • Part of subcall function 0056C291: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C31C
                                                                • Part of subcall function 0056C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C371
                                                                • Part of subcall function 0056C291: FindClose.KERNEL32(00000000,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C3D2
                                                                • Part of subcall function 0056C291: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C3D9
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                                • Part of subcall function 00554AA1: WaitForSingleObject.KERNEL32(?,00000000,0055547D,?,?,00000004,?,?,00000004,?,005C4EF8,?), ref: 00554B47
                                                                • Part of subcall function 00554AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,005C4EF8,?,?,?,?,?,?,0055547D), ref: 00554B75
                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00558197
                                                              • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 00558278
                                                              • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 005584C4
                                                              • DeleteFileA.KERNEL32(?), ref: 00558652
                                                                • Part of subcall function 0055880C: __EH_prolog.LIBCMT ref: 00558811
                                                                • Part of subcall function 0055880C: FindFirstFileW.KERNEL32(00000000,?,005B6608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005588CA
                                                                • Part of subcall function 0055880C: __CxxThrowException@8.LIBVCRUNTIME ref: 005588F2
                                                                • Part of subcall function 0055880C: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005588FF
                                                              • Sleep.KERNEL32(000007D0), ref: 005586F8
                                                              • StrToIntA.SHLWAPI(00000000,00000000), ref: 0055873A
                                                                • Part of subcall function 0056C9E2: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0056CAD7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                              • String ID: (P\$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XP\$XP\$XP\$XP\$open$N\
                                                              • API String ID: 1067849700-1660823179
                                                              • Opcode ID: e9ad8f9f8ef302e031fd4cc50c3d903d211e168e5bd96f6344fd40fbd693ccb6
                                                              • Instruction ID: 2f01f2fe6e2c4def5afdaaa434c6a5dd4b6ffae3617441d26da197d1c8cc2001
                                                              • Opcode Fuzzy Hash: e9ad8f9f8ef302e031fd4cc50c3d903d211e168e5bd96f6344fd40fbd693ccb6
                                                              • Instruction Fuzzy Hash: A5426F316046026BC618FB74D87FAAE7EA9BFD1302F40091EFC42571D2EE259A4DC796
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __Init_thread_footer.LIBCMT ref: 005556E6
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              • __Init_thread_footer.LIBCMT ref: 00555723
                                                              • CreatePipe.KERNEL32(005C6CCC,005C6CB4,005C6BD8,00000000,005B60BC,00000000), ref: 005557B6
                                                              • CreatePipe.KERNEL32(005C6CB8,005C6CD4,005C6BD8,00000000), ref: 005557CC
                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,005C6BE8,005C6CBC), ref: 0055583F
                                                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 00555897
                                                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 005558BC
                                                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 005558E9
                                                                • Part of subcall function 00584770: __onexit.LIBCMT ref: 00584776
                                                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,005C4F90,005B60C0,00000062,005B60A4), ref: 005559E4
                                                              • Sleep.KERNEL32(00000064,00000062,005B60A4), ref: 005559FE
                                                              • TerminateProcess.KERNEL32(00000000), ref: 00555A17
                                                              • CloseHandle.KERNEL32 ref: 00555A23
                                                              • CloseHandle.KERNEL32 ref: 00555A2B
                                                              • CloseHandle.KERNEL32 ref: 00555A3D
                                                              • CloseHandle.KERNEL32 ref: 00555A45
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                              • String ID: 0l\$0l\$0l\$0l\$0l\$SystemDrive$cmd.exe$k\
                                                              • API String ID: 2994406822-4023221762
                                                              • Opcode ID: fb512a1001fba5065b2efc887f675c977861c6b33b5273999696e7eeab228157
                                                              • Instruction ID: d0c6a77ff5337f9c7a30354864a44d613508d7a8ba605cbccb548aec22d97601
                                                              • Opcode Fuzzy Hash: fb512a1001fba5065b2efc887f675c977861c6b33b5273999696e7eeab228157
                                                              • Instruction Fuzzy Hash: 4E91D571604606AFC710BB64ECBAE2E3EA9FFD1345F00042EFC85961A2EE655D4C9B61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32 ref: 00562106
                                                                • Part of subcall function 00563877: RegCreateKeyA.ADVAPI32(80000001,00000000,005B60A4), ref: 00563885
                                                                • Part of subcall function 00563877: RegSetValueExA.KERNEL32(005B60A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0055C152,005B6C48,00000001,000000AF,005B60A4), ref: 005638A0
                                                                • Part of subcall function 00563877: RegCloseKey.ADVAPI32(005B60A4,?,?,?,0055C152,005B6C48,00000001,000000AF,005B60A4), ref: 005638AB
                                                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00562146
                                                              • CloseHandle.KERNEL32(00000000), ref: 00562155
                                                              • CreateThread.KERNEL32(00000000,00000000,005627EE,00000000,00000000,00000000), ref: 005621AB
                                                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0056241A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                              • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                              • API String ID: 3018269243-13974260
                                                              • Opcode ID: 0a085ccdcc7f6d40f0893e60ecc62f55812d87243adf8b68a37a54375b132f0c
                                                              • Instruction ID: 015dcb692e3b4338dd2ca859b9c489dabcce6b54053caaabe406d9580a436ff0
                                                              • Opcode Fuzzy Hash: 0a085ccdcc7f6d40f0893e60ecc62f55812d87243adf8b68a37a54375b132f0c
                                                              • Instruction Fuzzy Hash: E17152315046025BC618FB70DC6F9AE7FA5BEE1712F40092EB846531E2EF60A94DC7A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0055BBAF
                                                              • FindClose.KERNEL32(00000000), ref: 0055BBC9
                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0055BCEC
                                                              • FindClose.KERNEL32(00000000), ref: 0055BD12
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$CloseFile$FirstNext
                                                              • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                              • API String ID: 1164774033-3681987949
                                                              • Opcode ID: c68c5355b3a69c3396ce8622202827218dcf98e7d5466cc217d2a5843cbde6bc
                                                              • Instruction ID: fcb77961bde3db91cade77ba77fe94a1bb219655bb8dc3dd44fb4c4485518a0e
                                                              • Opcode Fuzzy Hash: c68c5355b3a69c3396ce8622202827218dcf98e7d5466cc217d2a5843cbde6bc
                                                              • Instruction Fuzzy Hash: 7E512D3190051A9ADB14F7A0DC6EEEDBF38BF91302F50055AF806A70D2EF206A4DCB55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenClipboard.USER32 ref: 005668C2
                                                              • EmptyClipboard.USER32 ref: 005668D0
                                                              • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 005668F0
                                                              • GlobalLock.KERNEL32(00000000), ref: 005668F9
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0056692F
                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00566938
                                                              • CloseClipboard.USER32 ref: 00566955
                                                              • OpenClipboard.USER32 ref: 0056695C
                                                              • GetClipboardData.USER32(0000000D), ref: 0056696C
                                                              • GlobalLock.KERNEL32(00000000), ref: 00566975
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0056697E
                                                              • CloseClipboard.USER32 ref: 00566984
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                              • String ID: !DU
                                                              • API String ID: 3520204547-1239079615
                                                              • Opcode ID: 98d89e87fe66d39e6110becc58300da1a6f70362a13977f1ca54d4f890d4dddb
                                                              • Instruction ID: 353cdb894b12f26ccdc1b5bc4181b53a009ee3b65124ec64ec9197be8072d5b9
                                                              • Opcode Fuzzy Hash: 98d89e87fe66d39e6110becc58300da1a6f70362a13977f1ca54d4f890d4dddb
                                                              • Instruction Fuzzy Hash: 702165312046125FCB14BBB0EC5EA7E7EA9BFD5702F40082EF80686191EF35890DD762
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,005C50E4,?,005C5338), ref: 0055F48E
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0055F4B9
                                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0055F4D5
                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0055F554
                                                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,005C5338), ref: 0055F563
                                                                • Part of subcall function 0056C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0056C1F5
                                                                • Part of subcall function 0056C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0056C208
                                                              • CloseHandle.KERNEL32(00000000,?,005C5338), ref: 0055F66E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                              • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                              • API String ID: 3756808967-1743721670
                                                              • Opcode ID: 4dc5c74c8498b9d4bcb471907d358296d10885b116ae3665a22519bd48a0e323
                                                              • Instruction ID: ba30d398982539bcb4e09d886daec26bc45887bd31c37dd00881676997b84cd0
                                                              • Opcode Fuzzy Hash: 4dc5c74c8498b9d4bcb471907d358296d10885b116ae3665a22519bd48a0e323
                                                              • Instruction Fuzzy Hash: 967126305087425BC714EB70D469AAE7FE5BFD5342F40082EF986431A2EF34A94DCB66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0$1$2$3$4$5$6$7$V\
                                                              • API String ID: 0-3835458818
                                                              • Opcode ID: 46aa9eb212c3da5398b39cebb22b37ea00915e7d233048ad0e3514d95c1340ff
                                                              • Instruction ID: 4752b269eb9ac298658de3c8b8f27c6edf020294cd9e2b377c38826227c5cfd3
                                                              • Opcode Fuzzy Hash: 46aa9eb212c3da5398b39cebb22b37ea00915e7d233048ad0e3514d95c1340ff
                                                              • Instruction Fuzzy Hash: 8871DF705087029FD704EF20D87ABAA7F98BF95310F10492EF992571D2EA74AB4DC792
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 00403EB1
                                                              • GetFileSizeEx.KERNEL32(?,?,00000000), ref: 00403EC3
                                                              • _malloc.LIBCMT ref: 00403EF5
                                                              • SetLastError.KERNEL32(00000008,?,00004000), ref: 00403F05
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorFileLastSize_malloc_memset
                                                              • String ID: N/f$.\QHImageHlp.c$GetFileSizeEx()$INIT$PE
                                                              • API String ID: 942205088-2408646100
                                                              • Opcode ID: d29a8001341c00f7ee7b1e8bc5221d3bcacaa4554a74bb46b78c7142d63d787c
                                                              • Instruction ID: 1e5c7d978d549367c3184b98c0c7fe6c27fb078ad7ff0f1d351f26898f72a1fe
                                                              • Opcode Fuzzy Hash: d29a8001341c00f7ee7b1e8bc5221d3bcacaa4554a74bb46b78c7142d63d787c
                                                              • Instruction Fuzzy Hash: 0AE1A0B1A043009BDB24DF15D841B6B76E4BBD4704F04493EFE89AB3C1E778DA458B9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _wcslen.LIBCMT ref: 00557521
                                                              • CoGetObject.OLE32(?,00000024,005B6518,00000000), ref: 00557582
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Object_wcslen
                                                              • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                              • API String ID: 240030777-3166923314
                                                              • Opcode ID: f78e103368edaa134c242c68af1072159f8dca33aab9ce6f4de77baf46cf2beb
                                                              • Instruction ID: 874d9e7fbbf44c2d633ea1b278ce9715940da96bc38c23461e65361c055d34d7
                                                              • Opcode Fuzzy Hash: f78e103368edaa134c242c68af1072159f8dca33aab9ce6f4de77baf46cf2beb
                                                              • Instruction Fuzzy Hash: DC117376904219ABD720E6949859EDEBFBCBB4C711F140466F804B3141E774AA088A71
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,005C58E8), ref: 0056A75E
                                                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0056A7AD
                                                              • GetLastError.KERNEL32 ref: 0056A7BB
                                                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0056A7F3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                              • String ID:
                                                              • API String ID: 3587775597-0
                                                              • Opcode ID: 96ba640f6a040ef7dc633812e0a2701e1799579d23389316277bb03fc48d982d
                                                              • Instruction ID: fcb34415f463c8610781b8c54bfae6d36fdcea964a69b4f8e9e58e95c411dbc6
                                                              • Opcode Fuzzy Hash: 96ba640f6a040ef7dc633812e0a2701e1799579d23389316277bb03fc48d982d
                                                              • Instruction Fuzzy Hash: 88814F31104305ABC314EB60D89AAAFBFA8BFD4345F50091EF98656161EF70EA4DCB96
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00598215: GetLastError.KERNEL32(00000020,?,0058A7F5,?,?,?,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B), ref: 00598219
                                                                • Part of subcall function 00598215: _free.LIBCMT ref: 0059824C
                                                                • Part of subcall function 00598215: SetLastError.KERNEL32(00000000,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B,?,00000041,00000000,00000000), ref: 0059828D
                                                                • Part of subcall function 00598215: _abort.LIBCMT ref: 00598293
                                                                • Part of subcall function 00598215: _free.LIBCMT ref: 00598274
                                                                • Part of subcall function 00598215: SetLastError.KERNEL32(00000000,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B,?,00000041,00000000,00000000), ref: 00598281
                                                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 005A271C
                                                              • IsValidCodePage.KERNEL32(00000000), ref: 005A2777
                                                              • IsValidLocale.KERNEL32(?,00000001), ref: 005A2786
                                                              • GetLocaleInfoW.KERNEL32(?,00001001,lJY,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 005A27CE
                                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 005A27ED
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                              • String ID: lJY$lJY$lJY
                                                              • API String ID: 745075371-3128319784
                                                              • Opcode ID: b2cc722a0b73c5e23de8ce1d2261949155837a44903b6f1d24c24acbc7025fbe
                                                              • Instruction ID: 5db2ba950cc92af560677805e7dcf80129e43ee9e43f1447d1987d3d4c7cbd29
                                                              • Opcode Fuzzy Hash: b2cc722a0b73c5e23de8ce1d2261949155837a44903b6f1d24c24acbc7025fbe
                                                              • Instruction Fuzzy Hash: CD51A175900216AFDF10DFA9DC86ABE7BB8FF5A300F140469F914EB190EB709A04DB61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00406249
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,00065E4E,004060C2,00000000,00002000,?,00000000,00000000,00401596,?,?,?,00401C5E,?,?), ref: 00406259
                                                              • CreateFileA.KERNEL32(00000000,00000000,00000003,00000000,00000003,00000080,00000000,00000000,00002000,00065E4E,004060C2,00000000,00002000,?,00000000,00000000), ref: 004062A0
                                                              • _memset.LIBCMT ref: 004062CA
                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,00000000,00002800,?,00000000), ref: 004062EB
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040631A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AllocCloseControlCreateDeviceErrorFileHandleHeapLast_malloc_memset
                                                              • String ID: DISKID:$\\.\PhysicalDrive%d
                                                              • API String ID: 2265051123-3765948602
                                                              • Opcode ID: 26cbdce573063f43a07f417fe75e999626897c1eb521f0934345e71a245bb68b
                                                              • Instruction ID: a225908e938814fc6ce8db3e87b0bc4a74b0325d29c7787301f826e6074e7c24
                                                              • Opcode Fuzzy Hash: 26cbdce573063f43a07f417fe75e999626897c1eb521f0934345e71a245bb68b
                                                              • Instruction Fuzzy Hash: 7031EE71644304AFD200EF65EC81E2B77E8EB84758F94053FF845962C1DB74E958879B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0055C39B
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0055C46E
                                                              • FindClose.KERNEL32(00000000), ref: 0055C47D
                                                              • FindClose.KERNEL32(00000000), ref: 0055C4A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$CloseFile$FirstNext
                                                              • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                              • API String ID: 1164774033-405221262
                                                              • Opcode ID: ee4c6b2711a1b0c1127c4aebcd5d22352efb00ab31d7bf001815378496b28cef
                                                              • Instruction ID: 21d3f45f7e601bc64e233bab07f3fbd97e444a753dff7ea71b6d510e4dfbaa4b
                                                              • Opcode Fuzzy Hash: ee4c6b2711a1b0c1127c4aebcd5d22352efb00ab31d7bf001815378496b28cef
                                                              • Instruction Fuzzy Hash: 16312F3150061A9ACB14E770DCAEEFE7F79BF91712F40055AB806A2091EF746A8DCA54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C2EC
                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C31C
                                                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C38E
                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C39B
                                                                • Part of subcall function 0056C291: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C371
                                                              • GetLastError.KERNEL32(?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C3BC
                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C3D2
                                                              • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C3D9
                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,005C52D8,005C52F0,00000001), ref: 0056C3E2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                              • String ID:
                                                              • API String ID: 2341273852-0
                                                              • Opcode ID: cc568239f23f6b9dd0a07a0a970cacef2136d74671d23ba368737b105b6aac2a
                                                              • Instruction ID: 619cee102c3a7331b626af3949c1180a1b873a87e8a48d816b6b2cd88578f9a4
                                                              • Opcode Fuzzy Hash: cc568239f23f6b9dd0a07a0a970cacef2136d74671d23ba368737b105b6aac2a
                                                              • Instruction Fuzzy Hash: 923164769002296ADB20EBA0DC4CFEA7F7CBF59300F4449A6E595E3151EB319A88CF50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00569D4B
                                                              • FindNextFileW.KERNEL32(00000000,?,?), ref: 00569E17
                                                                • Part of subcall function 0056C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0055A843), ref: 0056C49E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Find$CreateFirstNext
                                                              • String ID: 8S\$PX\$PX\$N\$P\
                                                              • API String ID: 341183262-3902406203
                                                              • Opcode ID: f63feef9df0feaae8cf3e6444408b9bb02b1512da37458d65efdde0bd31f2594
                                                              • Instruction ID: be20e3894755dae1ec959d1940f88e90e6cfd6972c2ae8a8ceda3c2abddd5f41
                                                              • Opcode Fuzzy Hash: f63feef9df0feaae8cf3e6444408b9bb02b1512da37458d65efdde0bd31f2594
                                                              • Instruction Fuzzy Hash: 89813D315086425AC314FB60D86AAEF7FA8BFD1341F90492EF846471E2EF30AA4DC756
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00567952: GetCurrentProcess.KERNEL32(00000028,?), ref: 0056795F
                                                                • Part of subcall function 00567952: OpenProcessToken.ADVAPI32(00000000), ref: 00567966
                                                                • Part of subcall function 00567952: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00567978
                                                                • Part of subcall function 00567952: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00567997
                                                                • Part of subcall function 00567952: GetLastError.KERNEL32 ref: 0056799D
                                                              • ExitWindowsEx.USER32(00000000,00000001), ref: 00566856
                                                              • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 0056686B
                                                              • GetProcAddress.KERNEL32(00000000), ref: 00566872
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                              • String ID: !DU$PowrProf.dll$SetSuspendState
                                                              • API String ID: 1589313981-377163239
                                                              • Opcode ID: cc239222c99fe59b23ad0848aca6f75392ae07a30a423712195a1bb3349392c4
                                                              • Instruction ID: 7b30b8233a270fb297c37f475ca91316071874e8ea3d750f37da3c45adbc2f71
                                                              • Opcode Fuzzy Hash: cc239222c99fe59b23ad0848aca6f75392ae07a30a423712195a1bb3349392c4
                                                              • Instruction Fuzzy Hash: 24214D616047079ADE14FBB498BFAAE2E9DBFC1741F400C2ABC02975C2EF24980DC765
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLocaleInfoW.KERNEL32(00000000,2000000B,00000000,00000002,00000000,?,?,?,005A275B,?,00000000), ref: 005A24D5
                                                              • GetLocaleInfoW.KERNEL32(00000000,20001004,00000000,00000002,00000000,?,?,?,005A275B,?,00000000), ref: 005A24FE
                                                              • GetACP.KERNEL32(?,?,005A275B,?,00000000), ref: 005A2513
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InfoLocale
                                                              • String ID: ACP$OCP$['Z
                                                              • API String ID: 2299586839-469542804
                                                              • Opcode ID: fd947fc5224de4417a7c2987675bb5b914b333a12e929205894f889e918b747b
                                                              • Instruction ID: f84f506d2f18f08b7e355cbe1b14dbff39b4fd019be8970b47bf011319b12192
                                                              • Opcode Fuzzy Hash: fd947fc5224de4417a7c2987675bb5b914b333a12e929205894f889e918b747b
                                                              • Instruction Fuzzy Hash: F221A132A00101AAEF349B5DD906AEF7FA6BF5EB64F568924E909DB110E732DD40C390
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00403370: _vswprintf_s.LIBCMT ref: 0040339C
                                                              • CreateFileA.KERNEL32(00000000,00000000,00000003,00000000,00000003,00000080,00000000,00000000,00002000,00065E4E,004060C2,00000000,00002000,?,00000000,00000000), ref: 004062A0
                                                              • _memset.LIBCMT ref: 004062CA
                                                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,00000000,00002800,?,00000000), ref: 004062EB
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040631A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseControlCreateDeviceFileHandle_memset_vswprintf_s
                                                              • String ID: DISKID:$\\.\PhysicalDrive%d
                                                              • API String ID: 2627556037-3765948602
                                                              • Opcode ID: 09db851be27ea68fc9fc6b10bab77541122b50d849f044dcab3b52a8cc0bc6df
                                                              • Instruction ID: 51abea45773ed5e4c9772979f595ec269391c6619f1927a7e50f4261b4a66d35
                                                              • Opcode Fuzzy Hash: 09db851be27ea68fc9fc6b10bab77541122b50d849f044dcab3b52a8cc0bc6df
                                                              • Instruction Fuzzy Hash: 2F11C671604300AFD210DF55EC86F2B77D8EB84748F90053EF945E62C1E774A9188BAA
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0055BA4E
                                                              • GetLastError.KERNEL32 ref: 0055BA58
                                                              Strings
                                                              • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0055BA19
                                                              • UserProfile, xrefs: 0055BA1E
                                                              • [Chrome StoredLogins found, cleared!], xrefs: 0055BA7E
                                                              • [Chrome StoredLogins not found], xrefs: 0055BA72
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DeleteErrorFileLast
                                                              • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                              • API String ID: 2018770650-1062637481
                                                              • Opcode ID: 2e6e229fb1a4848e54d52a0625fa766783c996c77f40998a5afdaf16887b9c97
                                                              • Instruction ID: f43e00ee37b30c6c3894186a3922db3695f6f191140a3761f2664b6491e49cb2
                                                              • Opcode Fuzzy Hash: 2e6e229fb1a4848e54d52a0625fa766783c996c77f40998a5afdaf16887b9c97
                                                              • Instruction Fuzzy Hash: 2201D631A841066A57047B75DC7F9FD7F24BE62742B400617FC02531E2EE11590CD7E2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0056795F
                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00567966
                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00567978
                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00567997
                                                              • GetLastError.KERNEL32 ref: 0056799D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                              • String ID: SeShutdownPrivilege
                                                              • API String ID: 3534403312-3733053543
                                                              • Opcode ID: d931ebcce19217efd7201645a61ffd73796868d60d0193a3264410f411904288
                                                              • Instruction ID: d0befca93e09375630981154d3a1e1eb5198ca057359c3a89d784c73279d4acc
                                                              • Opcode Fuzzy Hash: d931ebcce19217efd7201645a61ffd73796868d60d0193a3264410f411904288
                                                              • Instruction Fuzzy Hash: 9BF034B6801129BBDB10ABA0EC4DEEFBFBCEF46251F000054B909A1050D6344A08EAB1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 00559258
                                                                • Part of subcall function 005548C8: connect.WS2_32(?,?,?), ref: 005548E0
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 005592F4
                                                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 00559352
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 005593AA
                                                              • FindClose.KERNEL32(00000000), ref: 005593C1
                                                                • Part of subcall function 00554E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,005551C0,?,?,?,00555159), ref: 00554E38
                                                                • Part of subcall function 00554E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,005551C0,?,?,?,00555159), ref: 00554E43
                                                                • Part of subcall function 00554E26: CloseHandle.KERNEL32(?,?,?,?,00000000,?,005551C0,?,?,?,00555159), ref: 00554E4C
                                                              • FindClose.KERNEL32(00000000), ref: 005595B9
                                                                • Part of subcall function 00554AA1: WaitForSingleObject.KERNEL32(?,00000000,0055547D,?,?,00000004,?,?,00000004,?,005C4EF8,?), ref: 00554B47
                                                                • Part of subcall function 00554AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,005C4EF8,?,?,?,?,?,?,0055547D), ref: 00554B75
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                              • String ID:
                                                              • API String ID: 1824512719-0
                                                              • Opcode ID: e357272c4c5ed83a9f2448c4eef68c54042deff7da5b90e46a1f803f0869070d
                                                              • Instruction ID: 13eaec6883640db29fca7b7fc9916e56a6dc3ee1eb4c54338c328caf9ee3322f
                                                              • Opcode Fuzzy Hash: e357272c4c5ed83a9f2448c4eef68c54042deff7da5b90e46a1f803f0869070d
                                                              • Instruction Fuzzy Hash: 0DB15F3290011ADBCB14EBA0DDAAAED7F79BF44312F50455AF806A70D1EF346A4DCB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0056A6A0,00000000), ref: 0056AA53
                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0056A6A0,00000000), ref: 0056AA68
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,0056A6A0,00000000), ref: 0056AA75
                                                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0056A6A0,00000000), ref: 0056AA80
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,0056A6A0,00000000), ref: 0056AA92
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,0056A6A0,00000000), ref: 0056AA95
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Service$CloseHandle$Open$ManagerStart
                                                              • String ID:
                                                              • API String ID: 276877138-0
                                                              • Opcode ID: 52ccd005bfbb362d2212f254adf19bf67475afd1b3cdba64b48cdc9cfe4e2f6c
                                                              • Instruction ID: b889eb1791f13f7a82c50fcd87f9b8ecd4bf9d1ae853ad55ef9c44201434b903
                                                              • Opcode Fuzzy Hash: 52ccd005bfbb362d2212f254adf19bf67475afd1b3cdba64b48cdc9cfe4e2f6c
                                                              • Instruction Fuzzy Hash: F6F0BE711012356FD211AB30AC8CEBF3EACFF923A1B10041AF806930009B648C4DF9B1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00598215: GetLastError.KERNEL32(00000020,?,0058A7F5,?,?,?,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B), ref: 00598219
                                                                • Part of subcall function 00598215: _free.LIBCMT ref: 0059824C
                                                                • Part of subcall function 00598215: SetLastError.KERNEL32(00000000,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B,?,00000041,00000000,00000000), ref: 0059828D
                                                                • Part of subcall function 00598215: _abort.LIBCMT ref: 00598293
                                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00594A73,?,?,?,?,005944CA,?,00000004), ref: 005A1DBA
                                                              • _wcschr.LIBVCRUNTIME ref: 005A1E4A
                                                              • _wcschr.LIBVCRUNTIME ref: 005A1E58
                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,sJY,00000000,?), ref: 005A1EFB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                              • String ID: sJY
                                                              • API String ID: 4212172061-2983674308
                                                              • Opcode ID: 354360eeadc32e246718a560b283e49b0d74d6ccc83f9f12757e0790dc48e758
                                                              • Instruction ID: 90d5060e9376a71eb91d07a595b89181fdafa5b32f0b6ce4345620827c7c7a79
                                                              • Opcode Fuzzy Hash: 354360eeadc32e246718a560b283e49b0d74d6ccc83f9f12757e0790dc48e758
                                                              • Instruction Fuzzy Hash: C461F975600A06AADB24AB74CC86ABF7FACFF46310F14046AF905DB581EB74E900C768
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0056B4B9
                                                              • LoadResource.KERNEL32(00000000,?,?,0055F3DE,00000000), ref: 0056B4CD
                                                              • LockResource.KERNEL32(00000000,?,?,0055F3DE,00000000), ref: 0056B4D4
                                                              • SizeofResource.KERNEL32(00000000,?,?,0055F3DE,00000000), ref: 0056B4E3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Resource$FindLoadLockSizeof
                                                              • String ID: SETTINGS
                                                              • API String ID: 3473537107-594951305
                                                              • Opcode ID: 898968de24fc365dc72409797df19da4255c602016f4eec0b197809cc7a1f565
                                                              • Instruction ID: 28485de771f882f1beb378e01f2603f98914a0045721bf1723362e6b1fbd2c99
                                                              • Opcode Fuzzy Hash: 898968de24fc365dc72409797df19da4255c602016f4eec0b197809cc7a1f565
                                                              • Instruction Fuzzy Hash: A3E09275600761ABDB251B65AC4CD463E29F7E67537150054F5029A231CA314419EB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 0055966A
                                                              • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 005596E2
                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0055970B
                                                              • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 00559722
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$File$CloseFirstH_prologNext
                                                              • String ID:
                                                              • API String ID: 1157919129-0
                                                              • Opcode ID: e4904d5be2a37a71318f2af1c34ebddaea81a152191d35aca8c281e709442126
                                                              • Instruction ID: 9c0a204645dd1982f47429ec4c126722ed6124b7bcd0a20414cfb5abed007c88
                                                              • Opcode Fuzzy Hash: e4904d5be2a37a71318f2af1c34ebddaea81a152191d35aca8c281e709442126
                                                              • Instruction Fuzzy Hash: 6481323280011ADBCB15EBA0DCAAAED7B78BF55312F10416BE806A7091FF346B4DCB54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __EH_prolog.LIBCMT ref: 00558811
                                                              • FindFirstFileW.KERNEL32(00000000,?,005B6608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005588CA
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 005588F2
                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 005588FF
                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00558A15
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                              • String ID:
                                                              • API String ID: 1771804793-0
                                                              • Opcode ID: 5cacf23d8b87ac54fdc4059b05f10d814ef41d03afd1d3c632ae796967aa2b25
                                                              • Instruction ID: 08a0b4de3dc4a32b5d3ba7c2419e79a8584133ec85632401369306856efd2279
                                                              • Opcode Fuzzy Hash: 5cacf23d8b87ac54fdc4059b05f10d814ef41d03afd1d3c632ae796967aa2b25
                                                              • Instruction Fuzzy Hash: D451413190150A9ACF04FB74DD6A9ED7F68BF91312F50055ABC06A3092EF349B4CCB91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • IsDebuggerPresent.KERNEL32 ref: 00434B8F
                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00434BA4
                                                              • UnhandledExceptionFilter.KERNEL32(0045F6C0), ref: 00434BAF
                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00434BCB
                                                              • TerminateProcess.KERNEL32(00000000), ref: 00434BD2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                              • String ID:
                                                              • API String ID: 2579439406-0
                                                              • Opcode ID: 1aedecd378c2f8c13ed6721df79a08be873a1827c1eaed0c0787769e19c8aa15
                                                              • Instruction ID: c87577094888f478b7fe3db4e50f5c35210d74469f5d620301a0bbfa5ab1ebb5
                                                              • Opcode Fuzzy Hash: 1aedecd378c2f8c13ed6721df79a08be873a1827c1eaed0c0787769e19c8aa15
                                                              • Instruction Fuzzy Hash: 2521EFB4511B44AFD700DF24E988A443BA0FB18305F18613AE949A6271F7F4A9A5CF4F
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00557857
                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0055791F
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileFind$FirstNextsend
                                                              • String ID: XP\$XP\
                                                              • API String ID: 4113138495-3919730041
                                                              • Opcode ID: f5e9e3443a1cd20418efaa5b2745509014eb825035042cdc1f22d5083f74adb0
                                                              • Instruction ID: c1b6b93b886f7fc31de8aa3cf3a872ffcc96d00b529ee6b510cfbf36ddb600b3
                                                              • Opcode Fuzzy Hash: f5e9e3443a1cd20418efaa5b2745509014eb825035042cdc1f22d5083f74adb0
                                                              • Instruction Fuzzy Hash: 692164311082069BC314FB60D86DEEFBFA8BFD5356F40091AF99653091EF20AA4CC666
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0056CAD7
                                                                • Part of subcall function 0056376F: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 0056377E
                                                                • Part of subcall function 0056376F: RegSetValueExA.KERNEL32(?,005B74B8,00000000,?,00000000,00000000,005C52F0,?,?,0055F853,005B74B8,4.9.4 Pro), ref: 005637A6
                                                                • Part of subcall function 0056376F: RegCloseKey.KERNEL32(?,?,?,0055F853,005B74B8,4.9.4 Pro), ref: 005637B1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateInfoParametersSystemValue
                                                              • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                              • API String ID: 4127273184-3576401099
                                                              • Opcode ID: bcc921a89dcda094fc7c349dcbcfacee76d01c839721e79538a1ca13d0b06cdd
                                                              • Instruction ID: 60524d57bd7d051916e9e3600a9e1a7f435d9e9638fc64a208d60794f773a67f
                                                              • Opcode Fuzzy Hash: bcc921a89dcda094fc7c349dcbcfacee76d01c839721e79538a1ca13d0b06cdd
                                                              • Instruction Fuzzy Hash: 2B114F62B8020473D918717D4D2FFBE2C06F387B50F944169F9423B6C6D8D72A5443E6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(?,?,0059328B,?), ref: 005932D6
                                                              • TerminateProcess.KERNEL32(00000000,?,0059328B,?), ref: 005932DD
                                                              • ExitProcess.KERNEL32 ref: 005932EF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$CurrentExitTerminate
                                                              • String ID:
                                                              • API String ID: 1703294689-0
                                                              • Opcode ID: 490269f7fa21cb95b3455532467ebc97e35f063c6e3325bcfda9b48b10f2b5c1
                                                              • Instruction ID: 96f9f87215320bac5372278587805cb32729c5b6d17c74df74621ea2b91cf198
                                                              • Opcode Fuzzy Hash: 490269f7fa21cb95b3455532467ebc97e35f063c6e3325bcfda9b48b10f2b5c1
                                                              • Instruction Fuzzy Hash: 39E0B635440158EBCF126F64DD09A983F69FF92342F108414F9098A131CB36DE4ADA90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenClipboard.USER32(00000000), ref: 0055B711
                                                              • GetClipboardData.USER32(0000000D), ref: 0055B71D
                                                              • CloseClipboard.USER32 ref: 0055B725
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Clipboard$CloseDataOpen
                                                              • String ID:
                                                              • API String ID: 2058664381-0
                                                              • Opcode ID: 8b86f082cc6d8324c7ec8c3a9fac3600a61bb13a9c4477b727be7ccce92a548a
                                                              • Instruction ID: a494b6cd1f989552b4c187631b1c04007fbe2be5b57aa19558da3561be95a6f2
                                                              • Opcode Fuzzy Hash: 8b86f082cc6d8324c7ec8c3a9fac3600a61bb13a9c4477b727be7ccce92a548a
                                                              • Instruction Fuzzy Hash: C0E0C230244330AFD7209B60AC5CB9A7F60FFA6B52F00891BB8059E1D0C7708C48C661
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .
                                                              • API String ID: 0-248832578
                                                              • Opcode ID: 7caa4a5ad61e8aa0cee7a94281e066a9d892000155353d87da8211b354f683e2
                                                              • Instruction ID: f4cbc28e4abc75fd7885429fed9af1e2e8347098b2d4e8f8bd6abe45359db79a
                                                              • Opcode Fuzzy Hash: 7caa4a5ad61e8aa0cee7a94281e066a9d892000155353d87da8211b354f683e2
                                                              • Instruction Fuzzy Hash: 0D31E57290014AAFDF24DE78CC8AEEA7FBDEF86314F1401A8F818D7251E6309D458B50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: operator+$NameName::$Decorator::getName::operator+$ThisType$Name::operator|=Scope
                                                              • String ID: QD$QD
                                                              • API String ID: 398566123-1550548732
                                                              • Opcode ID: 794240fa5a1516c6d0e2d9c5d7a373a49819a2d09ceaf47e05691be9d527f491
                                                              • Instruction ID: d1b7e0adb0a3f196e2e037ff9ed62cdcf100d09a33e416e05376dfa50685d5fa
                                                              • Opcode Fuzzy Hash: 794240fa5a1516c6d0e2d9c5d7a373a49819a2d09ceaf47e05691be9d527f491
                                                              • Instruction Fuzzy Hash: DFB197B2900608AFEB10DF94C882EEE7BB8EF05305F15406FF505A7291DB79DA44CB5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00568136
                                                              • GetProcAddress.KERNEL32(00000000), ref: 00568139
                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 0056814A
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0056814D
                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 0056815E
                                                              • GetProcAddress.KERNEL32(00000000), ref: 00568161
                                                              • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 00568172
                                                              • GetProcAddress.KERNEL32(00000000), ref: 00568175
                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00568217
                                                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0056822F
                                                              • GetThreadContext.KERNEL32(?,00000000), ref: 00568245
                                                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 0056826B
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 005682ED
                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 00568301
                                                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00568341
                                                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 0056840B
                                                              • SetThreadContext.KERNEL32(?,00000000), ref: 00568428
                                                              • ResumeThread.KERNEL32(?), ref: 00568435
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0056844C
                                                              • GetCurrentProcess.KERNEL32(?), ref: 00568457
                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 00568472
                                                              • GetLastError.KERNEL32 ref: 0056847A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                              • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$`#v$ntdll
                                                              • API String ID: 4188446516-108836778
                                                              • Opcode ID: 52cc15ae73bca60d437bd22940a0360c292f3557a6c61b02b8b31cef3919bc24
                                                              • Instruction ID: 0cf9f90942272a323c13ef24416b4436c11a057e9ae35dc437549f62d1c864a0
                                                              • Opcode Fuzzy Hash: 52cc15ae73bca60d437bd22940a0360c292f3557a6c61b02b8b31cef3919bc24
                                                              • Instruction Fuzzy Hash: DFA15BB0604301AFDB509F64DC89F6ABBE8FF98749F000929F645D7291DB70E848DB65
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00562850: TerminateProcess.KERNEL32(00000000,pth_unenc,0055F8C8), ref: 00562860
                                                                • Part of subcall function 00562850: WaitForSingleObject.KERNEL32(000000FF), ref: 00562873
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0055D51D
                                                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0055D530
                                                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0055D549
                                                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0055D579
                                                                • Part of subcall function 0055B8AC: TerminateThread.KERNEL32(Function_0000A27D,00000000,005C52F0,pth_unenc,0055D0B8,005C52D8,005C52F0,?,pth_unenc), ref: 0055B8BB
                                                                • Part of subcall function 0055B8AC: UnhookWindowsHookEx.USER32(005C50F0), ref: 0055B8C7
                                                                • Part of subcall function 0055B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0055B8D5
                                                                • Part of subcall function 0056C3F1: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0056C510,00000000,00000000,?), ref: 0056C430
                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,005B6468,005B6468,00000000), ref: 0055D7C4
                                                              • ExitProcess.KERNEL32 ref: 0055D7D0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                              • String ID: """, 0$")$0q[$0q[$8S\$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dM\$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                              • API String ID: 1861856835-4139002753
                                                              • Opcode ID: ad937f99d04aeb2488f22ff119f138143cd005568a4f8515f07fc8258cafc070
                                                              • Instruction ID: 24cbe5177c5b3612ab50e1f60b512800a4c707c8ffb11ab007623de3df351dc9
                                                              • Opcode Fuzzy Hash: ad937f99d04aeb2488f22ff119f138143cd005568a4f8515f07fc8258cafc070
                                                              • Instruction Fuzzy Hash: 9C9151315086055AC714F774D87AAAFBFE9BFD5342F00042FB84A931A2EF20AD4DC666
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(00000005,?,00065844,?,00408984,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 00408395
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083B9
                                                              • GetLastError.KERNEL32(?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083DA
                                                              • _wcsrchr.LIBCMT ref: 00408443
                                                              • _wcsncpy.LIBCMT ref: 00408472
                                                              • _strerror.LIBCMT ref: 004084ED
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,?,00000003), ref: 00408522
                                                              • _wcsncpy.LIBCMT ref: 00408552
                                                              • LoadLibraryW.KERNEL32(00000044,?,?,?,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000), ref: 0040855B
                                                              • LoadLibraryW.KERNEL32(wininet.dll,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 0040857C
                                                              • LoadLibraryW.KERNEL32(mqutil.dll,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 004085B6
                                                              • LoadLibraryW.KERNEL32(netmsg.dll,?,?,?,?,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 004085F2
                                                              • FormatMessageW.KERNEL32(00001300,?,?,00000000,?,00000000,00000000), ref: 00408632
                                                              • _wcstok.LIBCMT ref: 00408648
                                                              • _vswprintf_s.LIBCMT ref: 00408683
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast$_wcsncpy$ByteCharFormatMessageMultiWide__getptd_noexit_strerror_vswprintf_s_wcsrchr_wcstok
                                                              • String ID: __crt$mqutil.dll$netmsg.dll$t,F$wininet.dll
                                                              • API String ID: 2660907230-770268917
                                                              • Opcode ID: faf70c990ec09a4e37772fbcd2026de65b54342e9bca4560a10c4358c1de2a0c
                                                              • Instruction ID: 47c072ff33d92121b9efd564083845d0c83aee102c006f26be13eb141e8ab587
                                                              • Opcode Fuzzy Hash: faf70c990ec09a4e37772fbcd2026de65b54342e9bca4560a10c4358c1de2a0c
                                                              • Instruction Fuzzy Hash: F7C1C271A007059FCB209F75C9857ABB7B5EF58300F14893EE89AE7391EB789900CB59
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00562850: TerminateProcess.KERNEL32(00000000,pth_unenc,0055F8C8), ref: 00562860
                                                                • Part of subcall function 00562850: WaitForSingleObject.KERNEL32(000000FF), ref: 00562873
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,005C52F0,?,pth_unenc), ref: 0055D1A5
                                                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0055D1B8
                                                              • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,005C52F0,?,pth_unenc), ref: 0055D1E8
                                                              • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,005C52F0,?,pth_unenc), ref: 0055D1F7
                                                                • Part of subcall function 0055B8AC: TerminateThread.KERNEL32(Function_0000A27D,00000000,005C52F0,pth_unenc,0055D0B8,005C52D8,005C52F0,?,pth_unenc), ref: 0055B8BB
                                                                • Part of subcall function 0055B8AC: UnhookWindowsHookEx.USER32(005C50F0), ref: 0055B8C7
                                                                • Part of subcall function 0055B8AC: TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0055B8D5
                                                                • Part of subcall function 0056B978: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,005B6468,0055D20D,.vbs,?,?,?,?,?,005C52F0), ref: 0056B99F
                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,005B6468,005B6468,00000000), ref: 0055D412
                                                              • ExitProcess.KERNEL32 ref: 0055D419
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                              • String ID: ")$.vbs$8S\$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dM\$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$hp[$open$pth_unenc$wend$while fso.FileExists("
                                                              • API String ID: 3797177996-1301016536
                                                              • Opcode ID: aa4386b8d86c121f7fb5efb36bc2cfd483fcf041aae4f8f3a12e6125be01db4b
                                                              • Instruction ID: 26f7ef07d2ee48938cb0ea7e9fcde269836c9f4780e254516ea95f25ef6395bf
                                                              • Opcode Fuzzy Hash: aa4386b8d86c121f7fb5efb36bc2cfd483fcf041aae4f8f3a12e6125be01db4b
                                                              • Instruction Fuzzy Hash: AA8162312086455BC714F770D87AAAF7FA9BFD5302F10082FB886571A2EF60AD4DC666
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,005C50E4,00000003), ref: 00562494
                                                              • ExitProcess.KERNEL32(00000000), ref: 005624A0
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0056251A
                                                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00562529
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00562534
                                                              • CloseHandle.KERNEL32(00000000), ref: 0056253B
                                                              • GetCurrentProcessId.KERNEL32 ref: 00562541
                                                              • PathFileExistsW.SHLWAPI(?), ref: 00562572
                                                              • GetTempPathW.KERNEL32(00000104,?), ref: 005625D5
                                                              • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 005625EF
                                                              • lstrcatW.KERNEL32(?,.exe), ref: 00562601
                                                                • Part of subcall function 0056C3F1: CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,00000000,?,?,00000000,0056C510,00000000,00000000,?), ref: 0056C430
                                                              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00562641
                                                              • Sleep.KERNEL32(000001F4), ref: 00562682
                                                              • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00562697
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 005626A2
                                                              • CloseHandle.KERNEL32(00000000), ref: 005626A9
                                                              • GetCurrentProcessId.KERNEL32 ref: 005626AF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                              • String ID: .exe$8S\$WDH$exepath$open$temp_
                                                              • API String ID: 2649220323-4018133170
                                                              • Opcode ID: 8935cd8bc34d446b87612ccec2330e37f10060b7fb8b40eca257e33d4bd26f56
                                                              • Instruction ID: 6479dcbf7a4cae56bde7c79ed2b59c546a14f8d094eb551f5c1af1d519300b1e
                                                              • Opcode Fuzzy Hash: 8935cd8bc34d446b87612ccec2330e37f10060b7fb8b40eca257e33d4bd26f56
                                                              • Instruction Fuzzy Hash: 0F51DD71A006166BDF10ABA0AC9AFFE3B7CBF95311F000556B802A7191EF749E49CB64
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0056B13C
                                                              • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0056B150
                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,005B60A4), ref: 0056B178
                                                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,005C4EE0,00000000), ref: 0056B18E
                                                              • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0056B1CF
                                                              • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0056B1E7
                                                              • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0056B1FC
                                                              • SetEvent.KERNEL32 ref: 0056B219
                                                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0056B22A
                                                              • CloseHandle.KERNEL32 ref: 0056B23A
                                                              • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0056B25C
                                                              • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0056B266
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                              • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$N\
                                                              • API String ID: 738084811-4138994965
                                                              • Opcode ID: 99af5066d87e2c38fbd4e6a58240a41a05fb67cb75e1f7ace5a74aa84e37ced2
                                                              • Instruction ID: 35eb947b3e1182f295b43c156e4eb7f71fffb5dd2597c0ce513fa7092e050e8d
                                                              • Opcode Fuzzy Hash: 99af5066d87e2c38fbd4e6a58240a41a05fb67cb75e1f7ace5a74aa84e37ced2
                                                              • Instruction Fuzzy Hash: 58519E712442066FE614B770DCAAEAF3FADBFD5755F00041AB946831A1EF206D4CCA66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00551AD9
                                                              • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00551B03
                                                              • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00551B13
                                                              • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00551B23
                                                              • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00551B33
                                                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00551B43
                                                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00551B54
                                                              • WriteFile.KERNEL32(00000000,005C2AAA,00000002,00000000,00000000), ref: 00551B65
                                                              • WriteFile.KERNEL32(00000000,005C2AAC,00000004,00000000,00000000), ref: 00551B75
                                                              • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00551B85
                                                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00551B96
                                                              • WriteFile.KERNEL32(00000000,005C2AB6,00000002,00000000,00000000), ref: 00551BA7
                                                              • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00551BB7
                                                              • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00551BC7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$Write$Create
                                                              • String ID: RIFF$WAVE$data$fmt
                                                              • API String ID: 1602526932-4212202414
                                                              • Opcode ID: 7c12f1387e8c91541a3d05aca912a9bfdd22e53b87f96c31af13d397a7ab61ba
                                                              • Instruction ID: ff4d73ceb06035cbf8bd33863334d464a2be68f3f732f15121cffe511e7140cc
                                                              • Opcode Fuzzy Hash: 7c12f1387e8c91541a3d05aca912a9bfdd22e53b87f96c31af13d397a7ab61ba
                                                              • Instruction Fuzzy Hash: 4E413D726443187EE210DA51DD86FBB7FECEB85F50F40091AF644D6080D7A4A909DBB3
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Users\user\Desktop\tu.exe,00000001,0055764D,C:\Users\user\Desktop\tu.exe,00000003,00557675,005C52D8,005576CE), ref: 00557284
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0055728D
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 005572A2
                                                              • GetProcAddress.KERNEL32(00000000), ref: 005572A5
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 005572B6
                                                              • GetProcAddress.KERNEL32(00000000), ref: 005572B9
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 005572CA
                                                              • GetProcAddress.KERNEL32(00000000), ref: 005572CD
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 005572DE
                                                              • GetProcAddress.KERNEL32(00000000), ref: 005572E1
                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 005572F2
                                                              • GetProcAddress.KERNEL32(00000000), ref: 005572F5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: C:\Users\user\Desktop\tu.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                              • API String ID: 1646373207-354237639
                                                              • Opcode ID: 9245e5dea00b3036a9ccec3e1341781426c0fcf51c7c08e019b8a04b7eeafeb6
                                                              • Instruction ID: 76d0feb6565e89b12ba0da8daf365662541b9fb656263197238e4a23276f8cb3
                                                              • Opcode Fuzzy Hash: 9245e5dea00b3036a9ccec3e1341781426c0fcf51c7c08e019b8a04b7eeafeb6
                                                              • Instruction Fuzzy Hash: 920184E5A4471A7ACB116B3F6C64D4B7FDCBE643527090827B805E2151EFBCE808DE60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentProcessId.KERNEL32(BB40E64E,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B7C4
                                                              • __snwprintf.LIBCMT ref: 0040B7DB
                                                              • CreateMutexW.KERNEL32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B7F5
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B808
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B818
                                                              • _memset.LIBCMT ref: 0040B834
                                                              • _swscanf.LIBCMT ref: 0040B86B
                                                              • GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,0045B14B,000000FF), ref: 0040B885
                                                              • HeapAlloc.KERNEL32(00000000,00000000,000005C0,?,?,?,?,?,?,?,?,?,?,?,?,0045B14B), ref: 0040B897
                                                              • __CxxThrowException@8.LIBCMT ref: 0040B8D2
                                                              • __swprintf.LIBCMT ref: 0040B8E9
                                                              • __CxxThrowException@8.LIBCMT ref: 0040B910
                                                              • ReleaseMutex.KERNEL32(?,?,00465204), ref: 0040B91E
                                                              • CloseHandle.KERNEL32(?), ref: 0040B940
                                                              • ReleaseMutex.KERNEL32(00000000), ref: 0040B963
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040B96E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Mutex$CloseException@8HandleHeapProcessReleaseThrow$AllocCreateCurrentErrorLastObjectSingleWait__snwprintf__swprintf_memset_swscanf
                                                              • String ID: %s %u$1830B7BD-F7A3-4c4d-989B-C004DE465EDE
                                                              • API String ID: 2967953817-332789905
                                                              • Opcode ID: 21630a82ff95050d2a936fc027293757e53b3bd1dc2a9272b0684d330f7f6356
                                                              • Instruction ID: b0080335ab30dc4e6b4e05c12cebb1b1aa067a19cdad22adf5ef2cdec4d22371
                                                              • Opcode Fuzzy Hash: 21630a82ff95050d2a936fc027293757e53b3bd1dc2a9272b0684d330f7f6356
                                                              • Instruction Fuzzy Hash: 145182B1900744ABDB10EFA4DD45BAE77A8EB14714F10423AF905E72D1EBB855048B9E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • lstrlenW.KERNEL32(?), ref: 0056C036
                                                              • _memcmp.LIBVCRUNTIME ref: 0056C04E
                                                              • lstrlenW.KERNEL32(?), ref: 0056C067
                                                              • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0056C0A2
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0056C0B5
                                                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0056C0F9
                                                              • lstrcmpW.KERNEL32(?,?), ref: 0056C114
                                                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0056C12C
                                                              • _wcslen.LIBCMT ref: 0056C13B
                                                              • FindVolumeClose.KERNEL32(?), ref: 0056C15B
                                                              • GetLastError.KERNEL32 ref: 0056C173
                                                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0056C1A0
                                                              • lstrcatW.KERNEL32(?,?), ref: 0056C1B9
                                                              • lstrcpyW.KERNEL32(?,?), ref: 0056C1C8
                                                              • GetLastError.KERNEL32 ref: 0056C1D0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                              • String ID: ?
                                                              • API String ID: 3941738427-1684325040
                                                              • Opcode ID: 5f7e614927783d74169beb8a52130c492aa1119f416ae53d5d7ff2bb32fcf6bf
                                                              • Instruction ID: 128522f53b6e0d5bf307789a80ff55597b81c222a466805aac4f8a4f0dede4b2
                                                              • Opcode Fuzzy Hash: 5f7e614927783d74169beb8a52130c492aa1119f416ae53d5d7ff2bb32fcf6bf
                                                              • Instruction Fuzzy Hash: E9416D71508356ABDB20DF60D84CAABBFECFB96750F40092AF585C3161EB70D948D7A2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$EnvironmentVariable$_wcschr
                                                              • String ID:
                                                              • API String ID: 3899193279-0
                                                              • Opcode ID: 54ae731eaee3d18a009713a900823fdb681c02f1b5ae9b7e344e28dd93c44ec5
                                                              • Instruction ID: dd5ecacbd82edf728a6d090d73a46c35b4f2c5f96cfb241f4ca2503abcb6542e
                                                              • Opcode Fuzzy Hash: 54ae731eaee3d18a009713a900823fdb681c02f1b5ae9b7e344e28dd93c44ec5
                                                              • Instruction Fuzzy Hash: 56D126719007026FDF24AFB8DC85AAEBFA8FF41324F05417EE915E7281EB3599048790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00562ACD
                                                                • Part of subcall function 0056B978: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,005B6468,0055D20D,.vbs,?,?,?,?,?,005C52F0), ref: 0056B99F
                                                                • Part of subcall function 00568568: CloseHandle.KERNEL32(005540F5,?,?,005540F5,005B5E74), ref: 0056857E
                                                                • Part of subcall function 00568568: CloseHandle.KERNEL32(t^[,?,?,005540F5,005B5E74), ref: 00568587
                                                              • Sleep.KERNEL32(0000000A,005B5E74), ref: 00562C1F
                                                              • Sleep.KERNEL32(0000000A,005B5E74,005B5E74), ref: 00562CC1
                                                              • Sleep.KERNEL32(0000000A,005B5E74,005B5E74,005B5E74), ref: 00562D63
                                                              • DeleteFileW.KERNEL32(00000000,005B5E74,005B5E74,005B5E74), ref: 00562DC5
                                                              • DeleteFileW.KERNEL32(00000000,005B5E74,005B5E74,005B5E74), ref: 00562DFC
                                                              • DeleteFileW.KERNEL32(00000000,005B5E74,005B5E74,005B5E74), ref: 00562E38
                                                              • Sleep.KERNEL32(000001F4,005B5E74,005B5E74,005B5E74), ref: 00562E52
                                                              • Sleep.KERNEL32(00000064), ref: 00562E94
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                              • String ID: /stext "$0T\$0T\$N\$N\
                                                              • API String ID: 1223786279-2267169114
                                                              • Opcode ID: 1edba678f39680cc94cc2328a9b477e3e05dfc614d4a83671ef6c0dd579b0aef
                                                              • Instruction ID: b835b5c2bca6d7e43e2328b86a320dbc813e3a14d4e05752addd3cd6279d690e
                                                              • Opcode Fuzzy Hash: 1edba678f39680cc94cc2328a9b477e3e05dfc614d4a83671ef6c0dd579b0aef
                                                              • Instruction Fuzzy Hash: BD0210315086424AC328EB70D86ABEEBFE5BFD5341F50482EF88A87191EF30594DCB56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0056C6B1
                                                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0056C6F5
                                                              • RegCloseKey.ADVAPI32(?), ref: 0056C9BF
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseEnumOpen
                                                              • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                              • API String ID: 1332880857-3714951968
                                                              • Opcode ID: 999f6ebc54995aef4813a19867ea25c14afdcb5177833b2cf41fe39c0f165e13
                                                              • Instruction ID: 429443b97bd18e76b0417c105cbe3785b8d13b3a255eba4623e724feafd123ac
                                                              • Opcode Fuzzy Hash: 999f6ebc54995aef4813a19867ea25c14afdcb5177833b2cf41fe39c0f165e13
                                                              • Instruction Fuzzy Hash: 548103711082469BD324EB20D865EEFBFE8BFD4345F50491EB58A83151FF30AA4DCA66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00406424
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,00000000,?,?,?,?,004060DB,00000000,00002000,00000000,00401596,?,?,?,00401C5E,?), ref: 00406434
                                                                • Part of subcall function 0042F2AE: __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0042F2AE: ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                                • Part of subcall function 0042F2AE: ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                                • Part of subcall function 0042F2AE: HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                                • Part of subcall function 0042F2AE: GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards,00000000,00020119,?,00000000,?,?,?,?,004060DB,00000000,00002000,00000000,00401596,?), ref: 0040645A
                                                              • RegEnumKeyExW.ADVAPI32 ref: 00406486
                                                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020119,?), ref: 004064AB
                                                              • RegQueryValueExA.ADVAPI32(?,ServiceName,00000000,?,00000004,?), ref: 004064DF
                                                              • RegCloseKey.ADVAPI32(?), ref: 0040650D
                                                              • RegEnumKeyExW.ADVAPI32(00000000,00000001,00000000,?,00000000,00000000,00000000,00000000), ref: 00406530
                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0040653F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseEnumErrorHeapLastOpen$AllocFreeQueryValue___sbh_find_block___sbh_free_block__lock_malloc
                                                              • String ID: %012I64X$MAC:$SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards$ServiceName
                                                              • API String ID: 3177717327-1531755283
                                                              • Opcode ID: e5e2b6cb0406eebcd3ecfd1ca0ec33acc8a31c79426b9c3f7b5b7b2d670d5707
                                                              • Instruction ID: 91a01f5ca6e93bf5eebee49e75ff8b246a23b9fedb22c95eae37365d202e933b
                                                              • Opcode Fuzzy Hash: e5e2b6cb0406eebcd3ecfd1ca0ec33acc8a31c79426b9c3f7b5b7b2d670d5707
                                                              • Instruction Fuzzy Hash: 6841B171204300BBE620DF95EC85F1BBBE8EFC4B59F40052EF945A22C5E678D908876A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DefWindowProcA.USER32(?,00000401,?,?), ref: 0056D5DA
                                                              • GetCursorPos.USER32(?), ref: 0056D5E9
                                                              • SetForegroundWindow.USER32(?), ref: 0056D5F2
                                                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0056D60C
                                                              • Shell_NotifyIconA.SHELL32(00000002,005C4B48), ref: 0056D65D
                                                              • ExitProcess.KERNEL32 ref: 0056D665
                                                              • CreatePopupMenu.USER32 ref: 0056D66B
                                                              • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0056D680
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                              • String ID: Close
                                                              • API String ID: 1657328048-3535843008
                                                              • Opcode ID: 7c847c2d8f425add12ec1dae1a5ff923a6c3f2f2c7fbbd1ea512de2eb610ff9f
                                                              • Instruction ID: 5ba01663e4ce2c08a22b763f634ebba1891ef3d6cd666c5f6da786a073b67b6b
                                                              • Opcode Fuzzy Hash: 7c847c2d8f425add12ec1dae1a5ff923a6c3f2f2c7fbbd1ea512de2eb610ff9f
                                                              • Instruction Fuzzy Hash: B4213671A00108BFDF154FA8ED1EE697F75FB29305F000918F606920B0DBB19D24EB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00558CE3
                                                              • GetFileSizeEx.KERNEL32(00000000,?), ref: 00558D1B
                                                              • __aulldiv.LIBCMT ref: 00558D4D
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00558E70
                                                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00558E8B
                                                              • CloseHandle.KERNEL32(00000000), ref: 00558F64
                                                              • CloseHandle.KERNEL32(00000000,00000052), ref: 00558FAE
                                                              • CloseHandle.KERNEL32(00000000), ref: 00558FFC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                              • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $N\
                                                              • API String ID: 3086580692-328270867
                                                              • Opcode ID: cce3aaf0d9cb548f12dab904a6bbcb3c8054701a97b07b9f4258aedacc451722
                                                              • Instruction ID: 29742276d85cb811c33b78fb2a0bdddef717d181709f2a510bb75ed80414e50b
                                                              • Opcode Fuzzy Hash: cce3aaf0d9cb548f12dab904a6bbcb3c8054701a97b07b9f4258aedacc451722
                                                              • Instruction Fuzzy Hash: CCB190315083419BC714FB24D8AAA7EBFE9BFC5351F40491EF84A93291EF309949CB56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 00408F32
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000), ref: 00408F50
                                                              • _vswprintf_s.LIBCMT ref: 00408FD4
                                                              • _wcsrchr.LIBCMT ref: 00409015
                                                              • __snwprintf.LIBCMT ref: 0040903B
                                                              • __CxxThrowException@8.LIBCMT ref: 00409081
                                                              • GetLastError.KERNEL32(?,004651D0), ref: 00409094
                                                              • SetLastError.KERNEL32(00000000), ref: 004090B2
                                                              • __CxxThrowException@8.LIBCMT ref: 004090D5
                                                              • __CxxThrowException@8.LIBCMT ref: 004090EB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$Exception@8Throw$__getptd_noexit__snwprintf_vswprintf_s_wcsrchr
                                                              • String ID: 4-F$<%s:%d>
                                                              • API String ID: 1135991162-2115238217
                                                              • Opcode ID: 8da0d668e8d2bed21a38bc542d697908a3f4a170cb8d83eb15cc4d257e8be0b2
                                                              • Instruction ID: 14e59de21d721aaef6b68cd87fe21ec90b452582bd65d8ba9509ecaee94afa43
                                                              • Opcode Fuzzy Hash: 8da0d668e8d2bed21a38bc542d697908a3f4a170cb8d83eb15cc4d257e8be0b2
                                                              • Instruction Fuzzy Hash: AB51C1715003019BC720EF29CC85BAB76E9EF89710F05493EF94597296EBB8DD04C7A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\360MachineSignature,00000000,00020119,?,00000000,?,00000000,?,?,?,00401C5E,?,?), ref: 00401666
                                                              • RegQueryValueExW.ADVAPI32(?,Operator,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 004016AD
                                                              • RegQueryValueExW.ADVAPI32(?,IssueDate,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 004016F4
                                                              • RegQueryValueExW.ADVAPI32(?,ExpirationDate,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 00401733
                                                              • RegQueryValueExW.ADVAPI32(?,SignData,00000000,?,00000000,?,?,00000000,?,?,?,00401C5E,?,?), ref: 0040176A
                                                              • RegCloseKey.ADVAPI32(?), ref: 004017A8
                                                              • RegCloseKey.ADVAPI32(?,?,00000000,?,?,?,00401C5E,?,?), ref: 004017C1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: QueryValue$Close$Open
                                                              • String ID: ExpirationDate$IssueDate$Operator$SOFTWARE\360MachineSignature$SignData
                                                              • API String ID: 2895014784-1479031278
                                                              • Opcode ID: 2d54e4a1bd58c59d3d4e4eac94afafb44d7a5f605dbedefef143314ab1df9f72
                                                              • Instruction ID: 1f7021fa9f236602036fbd2601c454c1c7a1e4c58a50fa6465acc4d7145fd61b
                                                              • Opcode Fuzzy Hash: 2d54e4a1bd58c59d3d4e4eac94afafb44d7a5f605dbedefef143314ab1df9f72
                                                              • Instruction Fuzzy Hash: AA5130B16043029FC320CF69DC80A6BB7E8EBD4754F444A2EF595E3350E774E9098B5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ___free_lconv_mon.LIBCMT ref: 005A130A
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A051F
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A0531
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A0543
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A0555
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A0567
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A0579
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A058B
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A059D
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A05AF
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A05C1
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A05D3
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A05E5
                                                                • Part of subcall function 005A0502: _free.LIBCMT ref: 005A05F7
                                                              • _free.LIBCMT ref: 005A12FF
                                                                • Part of subcall function 00596782: RtlFreeHeap.NTDLL(00000000,00000000,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?), ref: 00596798
                                                                • Part of subcall function 00596782: GetLastError.KERNEL32(?,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?,?), ref: 005967AA
                                                              • _free.LIBCMT ref: 005A1321
                                                              • _free.LIBCMT ref: 005A1336
                                                              • _free.LIBCMT ref: 005A1341
                                                              • _free.LIBCMT ref: 005A1363
                                                              • _free.LIBCMT ref: 005A1376
                                                              • _free.LIBCMT ref: 005A1384
                                                              • _free.LIBCMT ref: 005A138F
                                                              • _free.LIBCMT ref: 005A13C7
                                                              • _free.LIBCMT ref: 005A13CE
                                                              • _free.LIBCMT ref: 005A13EB
                                                              • _free.LIBCMT ref: 005A1403
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                              • String ID:
                                                              • API String ID: 161543041-0
                                                              • Opcode ID: 80ec83100d154ff7b483e02c96378f5eb70d38087fb1309d8286723f42a69d0e
                                                              • Instruction ID: bd1438912cdd726f08fc3d3c8da10b60a1a7121ca56d9ff8af5194d44ef08b95
                                                              • Opcode Fuzzy Hash: 80ec83100d154ff7b483e02c96378f5eb70d38087fb1309d8286723f42a69d0e
                                                              • Instruction Fuzzy Hash: 53318B31600B029FEF20AFB9D889B5E7BE8FF42315F10891AE068D6551DA74BD449B68
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00562850: TerminateProcess.KERNEL32(00000000,pth_unenc,0055F8C8), ref: 00562860
                                                                • Part of subcall function 00562850: WaitForSingleObject.KERNEL32(000000FF), ref: 00562873
                                                                • Part of subcall function 005636F8: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,005C52F0), ref: 00563714
                                                                • Part of subcall function 005636F8: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 0056372D
                                                                • Part of subcall function 005636F8: RegCloseKey.KERNEL32(00000000), ref: 00563738
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0055D859
                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,005B6468,005B6468,00000000), ref: 0055D9B8
                                                              • ExitProcess.KERNEL32 ref: 0055D9C4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                              • String ID: """, 0$.vbs$8S\$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                              • API String ID: 1913171305-3974700463
                                                              • Opcode ID: 37187fcf58b3f386143ee757e3c51ec6476a8b3c18d660099c6cc23f8c896721
                                                              • Instruction ID: fcc6856b51177a2c75371ec20df8a9d7fb692aaba02ae1c4e06e846f40342843
                                                              • Opcode Fuzzy Hash: 37187fcf58b3f386143ee757e3c51ec6476a8b3c18d660099c6cc23f8c896721
                                                              • Instruction Fuzzy Hash: C54128319105195ADB14F774DC6ADFEBF79BF95702F00016AF806A3191EF206E8ECAA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID:
                                                              • API String ID: 269201875-0
                                                              • Opcode ID: 500ad294f088bc857011c103e36cdd8b0dacdbd012b0597b09f94632f85b0c53
                                                              • Instruction ID: 5ba98d610e304d1b0db0bbb269081c193be7da528067bfeec6d37ec8219fd105
                                                              • Opcode Fuzzy Hash: 500ad294f088bc857011c103e36cdd8b0dacdbd012b0597b09f94632f85b0c53
                                                              • Instruction Fuzzy Hash: 0FC16372E40205AFDB20DBA8CC86FEE7BFCBB49704F140165FA05EB282D6749D4597A4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 005A58A9: CreateFileW.KERNEL32(00000000,00000000,?,005A5C84,?,?,00000000,?,005A5C84,00000000,0000000C), ref: 005A58C6
                                                              • GetLastError.KERNEL32 ref: 005A5CEF
                                                              • __dosmaperr.LIBCMT ref: 005A5CF6
                                                              • GetFileType.KERNEL32(00000000), ref: 005A5D02
                                                              • GetLastError.KERNEL32 ref: 005A5D0C
                                                              • __dosmaperr.LIBCMT ref: 005A5D15
                                                              • CloseHandle.KERNEL32(00000000), ref: 005A5D35
                                                              • CloseHandle.KERNEL32(?), ref: 005A5E7F
                                                              • GetLastError.KERNEL32 ref: 005A5EB1
                                                              • __dosmaperr.LIBCMT ref: 005A5EB8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                              • String ID: H
                                                              • API String ID: 4237864984-2852464175
                                                              • Opcode ID: 29be19f638d08b1537dfb99ebafb7bab748bc12dd7dab3dcd9f350b2d63b003d
                                                              • Instruction ID: 6bba160f93bc7766e9d4a9154ca5bab9324d4e2131b89af45c704d9130b7a79d
                                                              • Opcode Fuzzy Hash: 29be19f638d08b1537dfb99ebafb7bab748bc12dd7dab3dcd9f350b2d63b003d
                                                              • Instruction Fuzzy Hash: 5BA14332A106599FDF189F68DC55BAE3FA0BB47320F180149F811DB2E1EB308D16DB51
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID: \&\$\&\$`&\
                                                              • API String ID: 269201875-3168631238
                                                              • Opcode ID: b78fbc46802a0798c8545c889fdb698924e15e2d3a34476a47235366ccdd791e
                                                              • Instruction ID: 14292ed4c558d6b5cddede91d0b12fb2228643a85e83e72073d34b3c23ace279
                                                              • Opcode Fuzzy Hash: b78fbc46802a0798c8545c889fdb698924e15e2d3a34476a47235366ccdd791e
                                                              • Instruction Fuzzy Hash: E561D371910209AFDB20DF68C942BAEBFF4FB46714F144169E954EB282E770AD41DBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 65535$udp
                                                              • API String ID: 0-1267037602
                                                              • Opcode ID: 9f979b51a65b83826a716c41468b0d833cb297b2389f0d9a808dcfab0e172560
                                                              • Instruction ID: b8f3768f6cd0b4c1fd3016e56f584b0011ecdfa7f2e25dbf3807ef38d20ee228
                                                              • Opcode Fuzzy Hash: 9f979b51a65b83826a716c41468b0d833cb297b2389f0d9a808dcfab0e172560
                                                              • Instruction Fuzzy Hash: 7951D431A06712AFE7259B68D905B3B7FF4FF88740F080929F881972A1D765DC409FA6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __getptd
                                                              • String ID: MOC$csm$csm
                                                              • API String ID: 3384420010-2232927589
                                                              • Opcode ID: 392d5472d71fa33a46a6336c1c2ef07575f60051be97fb51371ea02d882e00af
                                                              • Instruction ID: e8da79c3ca801231d8ecad43d2117962de43db7f41a6095863ddad8b9e0fae0f
                                                              • Opcode Fuzzy Hash: 392d5472d71fa33a46a6336c1c2ef07575f60051be97fb51371ea02d882e00af
                                                              • Instruction Fuzzy Hash: 1B31AC71400604DFDB308E59C482B6A73A8FB18319F58692BDA86C7352DB78E9458BDB
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00551D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0058A892
                                                              • GetLastError.KERNEL32(?,?,00551D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0058A89F
                                                              • __dosmaperr.LIBCMT ref: 0058A8A6
                                                              • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00551D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0058A8D2
                                                              • GetLastError.KERNEL32(?,?,?,00551D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0058A8DC
                                                              • __dosmaperr.LIBCMT ref: 0058A8E3
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00551D55,?), ref: 0058A926
                                                              • GetLastError.KERNEL32(?,?,?,?,?,?,00551D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0058A930
                                                              • __dosmaperr.LIBCMT ref: 0058A937
                                                              • _free.LIBCMT ref: 0058A943
                                                              • _free.LIBCMT ref: 0058A94A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                              • String ID:
                                                              • API String ID: 2441525078-0
                                                              • Opcode ID: 3dae0386e2a5318bcb10d1ae1e442c91518d15b2235e9a76a59c39f217246369
                                                              • Instruction ID: 1c3497e8d10dd3c2888c2f04362bf1fabdbe5da855d3605e1e272308644958c7
                                                              • Opcode Fuzzy Hash: 3dae0386e2a5318bcb10d1ae1e442c91518d15b2235e9a76a59c39f217246369
                                                              • Instruction Fuzzy Hash: 5131B17180814ABFEF11AFA4CC49DAE3F68FF45364B110216FC10661A1DB31CD51EB61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?,?,?,?,00000000,00000002,00401D80,?,?,?,?,?,?,?,?), ref: 00404709
                                                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?), ref: 0040479C
                                                              • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,?,?), ref: 004047B8
                                                              • SetFilePointerEx.KERNEL32(?,00000000,00000000,00000000,00000000,?,?,?,?), ref: 00404844
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$ReadSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 1971422761-3013408749
                                                              • Opcode ID: a95abc0583216832b83594f0851043222c33722ba269c4598de5ff927bbac7b7
                                                              • Instruction ID: 03dfb4d2336c3ded1a3879e9d3a15ab1a4d94976a0d75a54ec2001c5ebdae41d
                                                              • Opcode Fuzzy Hash: a95abc0583216832b83594f0851043222c33722ba269c4598de5ff927bbac7b7
                                                              • Instruction Fuzzy Hash: 597114B6B443016BD210EA25DD81F2B7395EBC4B15F14493EFA44A73C0EA7DEC0587A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetEvent.KERNEL32(?,?), ref: 005554BF
                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0055556F
                                                              • TranslateMessage.USER32(?), ref: 0055557E
                                                              • DispatchMessageA.USER32(?), ref: 00555589
                                                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,005C4F78), ref: 00555641
                                                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00555679
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                              • String ID: CloseChat$DisplayMessage$GetMessage
                                                              • API String ID: 2956720200-749203953
                                                              • Opcode ID: fe3e7db3b53044761986da8436c230940970a9e551b9aafaf0154a8783094e72
                                                              • Instruction ID: 1001b087dfdb60c5605bb238b253f0ea78c752adcec61dc67804c5c64339cc47
                                                              • Opcode Fuzzy Hash: fe3e7db3b53044761986da8436c230940970a9e551b9aafaf0154a8783094e72
                                                              • Instruction Fuzzy Hash: 66418D32604A026BCB14FB75DC6E96E7FA9BFC6701F40091EB91287591EF34990DCB92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00567F2C: __EH_prolog.LIBCMT ref: 00567F31
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,005B60A4), ref: 00567DDC
                                                              • CloseHandle.KERNEL32(00000000), ref: 00567DE5
                                                              • DeleteFileA.KERNEL32(00000000), ref: 00567DF4
                                                              • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00567DA8
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                              • String ID: 0V\$0V\$<$@$Temp
                                                              • API String ID: 1704390241-1866660946
                                                              • Opcode ID: 83e7623cb56d2c82a50ea2ffa7097d30fb48fd40860b1dd7cd9707078e2991ac
                                                              • Instruction ID: e7c7c9ff82eac06014f4ddcc1a591d27233c7208d18ccd9b4818f61e77b42d9d
                                                              • Opcode Fuzzy Hash: 83e7623cb56d2c82a50ea2ffa7097d30fb48fd40860b1dd7cd9707078e2991ac
                                                              • Instruction Fuzzy Hash: 65414A3190020A9ACB14FBA1DC6ABED7F78BF91315F404169F906664D1EF751A8DCBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B6AB
                                                              • 1830B7BD-F7A3-4c4d-989B-C004DE465EDE, xrefs: 0040B6A5
                                                              • %s-%d-%s:, xrefs: 0040B6B0
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Atom_memset$CurrentDeleteFindProcess__vswprintf_s_lswprintf
                                                              • String ID: %s-%d-%s:$1830B7BD-F7A3-4c4d-989B-C004DE465EDE${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 389091746-1980942712
                                                              • Opcode ID: 437e8d90748bc7b6513a2a46a6f3fe04147eb6367c4c28063d2286c0b8bc6247
                                                              • Instruction ID: 2e7dcfaec5885a51cec920f46e6640d5eddf5b0521efb3552e3d683f1a8d1c5a
                                                              • Opcode Fuzzy Hash: 437e8d90748bc7b6513a2a46a6f3fe04147eb6367c4c28063d2286c0b8bc6247
                                                              • Instruction Fuzzy Hash: 7021F7B1104300ABD314EB64DC96AFBB3A9EFD4700F84453FFA4583191EBB89504879E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • UnDecorator::UScore.LIBCMT ref: 004456A4
                                                              • DName::DName.LIBCMT ref: 004456B0
                                                                • Part of subcall function 004435CF: DName::doPchar.LIBCMT ref: 004435FC
                                                              • DName::DName.LIBCMT ref: 004456DD
                                                                • Part of subcall function 00443203: DNameStatusNode::make.LIBCMT ref: 00443231
                                                              • UnDecorator::getScopedName.LIBCMT ref: 004456EB
                                                              • DName::operator+=.LIBCMT ref: 004456F5
                                                              • DName::operator+=.LIBCMT ref: 00445704
                                                              • DName::operator+=.LIBCMT ref: 00445710
                                                              • DName::operator+=.LIBCMT ref: 0044571D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: NameName::operator+=$Name::$Decorator::Decorator::getName::doNode::makePcharScopedScoreStatus
                                                              • String ID: void
                                                              • API String ID: 2229739886-3531332078
                                                              • Opcode ID: 5015c3408bcb27d64949bf4dae6a3a8c0bd37e1f0a86d6c0238cc5b9e1a2eb31
                                                              • Instruction ID: eb00b007f5abc369386499d998b18eebabc6c8172c4893b9a245dc17d1844bad
                                                              • Opcode Fuzzy Hash: 5015c3408bcb27d64949bf4dae6a3a8c0bd37e1f0a86d6c0238cc5b9e1a2eb31
                                                              • Instruction Fuzzy Hash: F2118670900504ABEB08EF64C886AAD7B64AB40709F40405BF006A72D2EBB8AA45CB49
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenClipboard.USER32 ref: 00566941
                                                              • EmptyClipboard.USER32 ref: 0056694F
                                                              • CloseClipboard.USER32 ref: 00566955
                                                              • OpenClipboard.USER32 ref: 0056695C
                                                              • GetClipboardData.USER32(0000000D), ref: 0056696C
                                                              • GlobalLock.KERNEL32(00000000), ref: 00566975
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0056697E
                                                              • CloseClipboard.USER32 ref: 00566984
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                              • String ID: !DU
                                                              • API String ID: 2172192267-1239079615
                                                              • Opcode ID: 5da85d1832b2bb7cf26c2805ca0f50fc878f4069e31ce5947b0f71ad2d8b79e2
                                                              • Instruction ID: 2ec98e2526cbdd2b9eac807cf941c5cbd307d91309d1931af2cc0fb28ef1729e
                                                              • Opcode Fuzzy Hash: 5da85d1832b2bb7cf26c2805ca0f50fc878f4069e31ce5947b0f71ad2d8b79e2
                                                              • Instruction Fuzzy Hash: A00175312146115FCB14BB75EC5D6AE7FB9BFD5712F40082EF806865A1DF31884CDA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __fileno$__cftof__getbuf__wctomb_s_l
                                                              • String ID:
                                                              • API String ID: 1564009976-0
                                                              • Opcode ID: 8f5f60656d8aee7740e73f9f92f01c785faa6956bd2cc472c8204fa9af18c4d8
                                                              • Instruction ID: 83c87296a530c54ed5d9dc8e46f76a92cbeb1989d0cf7a41b3e55cd3b412d914
                                                              • Opcode Fuzzy Hash: 8f5f60656d8aee7740e73f9f92f01c785faa6956bd2cc472c8204fa9af18c4d8
                                                              • Instruction Fuzzy Hash: E45133325006059FCB349F29C940A6B73E0AF56329F14852FE8A6D73C2D7B8ED49CB49
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00563417
                                                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00563425
                                                              • GetFileSize.KERNEL32(?,00000000), ref: 00563432
                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00563452
                                                              • CloseHandle.KERNEL32(00000000), ref: 0056345F
                                                              • CloseHandle.KERNEL32(?), ref: 00563465
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                              • String ID:
                                                              • API String ID: 297527592-0
                                                              • Opcode ID: 5fdf79293008db946fe83eb42963e33280f1454cc692ec490f7196deb8f84836
                                                              • Instruction ID: 9981b4a5777982f7d25521b660aac31d938b3a64e2dfe3aa6c370d78bcd740f2
                                                              • Opcode Fuzzy Hash: 5fdf79293008db946fe83eb42963e33280f1454cc692ec490f7196deb8f84836
                                                              • Instruction Fuzzy Hash: 5841B131608202BBEB20AB25DC4AF6B7EACFFC5724F100919F555D61A1DF30CA05D762
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __calloc_crt.LIBCMT ref: 00437866
                                                                • Part of subcall function 004356D3: __calloc_impl.LIBCMT ref: 004356E4
                                                                • Part of subcall function 004356D3: Sleep.KERNEL32(00000000,?,?,00002000), ref: 004356FB
                                                              • __calloc_crt.LIBCMT ref: 0043788A
                                                              • __calloc_crt.LIBCMT ref: 004378A6
                                                              • __copytlocinfo_nolock.LIBCMT ref: 004378CB
                                                              • __setlocale_nolock.LIBCMT ref: 004378D8
                                                              • ___removelocaleref.LIBCMT ref: 004378E4
                                                              • ___freetlocinfo.LIBCMT ref: 004378EB
                                                              • __setmbcp_nolock.LIBCMT ref: 00437903
                                                              • ___removelocaleref.LIBCMT ref: 00437918
                                                              • ___freetlocinfo.LIBCMT ref: 0043791F
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __calloc_crt$___freetlocinfo___removelocaleref$Sleep__calloc_impl__copytlocinfo_nolock__setlocale_nolock__setmbcp_nolock
                                                              • String ID:
                                                              • API String ID: 2969281212-0
                                                              • Opcode ID: cca770cd89a3457768f8d1dee5c51a7bb805c9547a9ab6f93a5d569ae38ab5d2
                                                              • Instruction ID: 0bda3ca86f29450c0e7a3ef308c41bbb666b0ae9fb036e98977096b7d3cefda8
                                                              • Opcode Fuzzy Hash: cca770cd89a3457768f8d1dee5c51a7bb805c9547a9ab6f93a5d569ae38ab5d2
                                                              • Instruction Fuzzy Hash: 12210675208A01EBE7357F27D806A0A7BE0DF8D364F61943FF4C556261DE399801C65D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0056A486,00000000), ref: 0056AB1C
                                                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0056A486,00000000), ref: 0056AB33
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A486,00000000), ref: 0056AB40
                                                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0056A486,00000000), ref: 0056AB4F
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A486,00000000), ref: 0056AB60
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A486,00000000), ref: 0056AB63
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                              • String ID:
                                                              • API String ID: 221034970-0
                                                              • Opcode ID: 4e2f82c368cfc79e0aa219aa71c4df548ceb16ea73e5776d6758038b46117d38
                                                              • Instruction ID: 784262f1637285d8ff0644913c768a2423d6436fbcf308da2f9a266e1ac37a04
                                                              • Opcode Fuzzy Hash: 4e2f82c368cfc79e0aa219aa71c4df548ceb16ea73e5776d6758038b46117d38
                                                              • Instruction Fuzzy Hash: 9111C2719401286F9721AB64DC8DDFF7FACFB933A1B100016F905A3060DB245D49AAF2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _free.LIBCMT ref: 00598135
                                                                • Part of subcall function 00596782: RtlFreeHeap.NTDLL(00000000,00000000,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?), ref: 00596798
                                                                • Part of subcall function 00596782: GetLastError.KERNEL32(?,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?,?), ref: 005967AA
                                                              • _free.LIBCMT ref: 00598141
                                                              • _free.LIBCMT ref: 0059814C
                                                              • _free.LIBCMT ref: 00598157
                                                              • _free.LIBCMT ref: 00598162
                                                              • _free.LIBCMT ref: 0059816D
                                                              • _free.LIBCMT ref: 00598178
                                                              • _free.LIBCMT ref: 00598183
                                                              • _free.LIBCMT ref: 0059818E
                                                              • _free.LIBCMT ref: 0059819C
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: c869e7d8ebe7893526974a89e70a55664a4c19222ac7fe1a9a027277b3907d5c
                                                              • Instruction ID: 4654d42f3d6ca774e620b4cb6afcef314297cfd368b5ffa31ae6d73b9504191e
                                                              • Opcode Fuzzy Hash: c869e7d8ebe7893526974a89e70a55664a4c19222ac7fe1a9a027277b3907d5c
                                                              • Instruction Fuzzy Hash: EE11A47A500109AFCF01EF94C886CD93FA5FF44359B0140A5BA588F222DA35EF54ABC0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,00405C4F,?,00000000,?), ref: 004049FC
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,00405C4F,?,00000000,?), ref: 00404A9C
                                                              • ReadFile.KERNEL32(?,?,00008000,?,00000000,?,?,?,?,?,00405C4F,?,00000000,?), ref: 00404AB8
                                                              • _memset.LIBCMT ref: 00404B63
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$PointerReadSize_memset
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 1834740430-3013408749
                                                              • Opcode ID: a7950db58af37fb67f0db474653cdd921a8e7a1659f061b88f3d7dd1b801e97c
                                                              • Instruction ID: c7279cdef8b6de9ed2af9f0036a7ef1b0d318f082f7ee79805dd3dc40297ac8b
                                                              • Opcode Fuzzy Hash: a7950db58af37fb67f0db474653cdd921a8e7a1659f061b88f3d7dd1b801e97c
                                                              • Instruction Fuzzy Hash: 816126B17443006BD314DA29DD81B2BB3E0EBC8755F04493EF988E3280E77CE9448B8A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Eventinet_ntoa
                                                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$N\
                                                              • API String ID: 3578746661-1555973973
                                                              • Opcode ID: 73e8be69921836e0c7956083a2362af3b0e3607c8f976fa6c29c52b2f60a8295
                                                              • Instruction ID: 23b202b4d5b15c05a06de06899008da028e8932674b0aa9c90164963f80cfb92
                                                              • Opcode Fuzzy Hash: 73e8be69921836e0c7956083a2362af3b0e3607c8f976fa6c29c52b2f60a8295
                                                              • Instruction Fuzzy Hash: 8151E271A04A415FCB14FB34D82EA7E3EA5BBE5301F44452AF8028B6E1DF34990ED796
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?), ref: 004039C5
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403A7F
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403AA9
                                                              • SetEndOfFile.KERNEL32(?), ref: 00403AE9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$Size
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$SetEndOfFile()$SetFilePointerEx()
                                                              • API String ID: 408439848-1520550917
                                                              • Opcode ID: efe5ed57b227063c12dfbf8f0175d8ac109c7d29c0f11d32ce57c5971a172218
                                                              • Instruction ID: 1b605d734e155b873fdfd4f28f3e3ae818b90f9930aa0250b92f2f22e38c86b6
                                                              • Opcode Fuzzy Hash: efe5ed57b227063c12dfbf8f0175d8ac109c7d29c0f11d32ce57c5971a172218
                                                              • Instruction Fuzzy Hash: 3641B4317043015BD710DE659D81B2B7BD8AB88B4AF04093FF584B72C1E6BCEA058A9E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?), ref: 004037D1
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 0040386C
                                                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0040388C
                                                              • SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000000), ref: 004038B3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$ReadSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 1971422761-3013408749
                                                              • Opcode ID: d80dedbebb2793100ef8afd5d2585e2e953f73e2ae1894905a99123231bb69ca
                                                              • Instruction ID: bd2c35f2d9b3925e1a7ba6d6698aa27c55923003429fdbcc139eee9cb6e742a9
                                                              • Opcode Fuzzy Hash: d80dedbebb2793100ef8afd5d2585e2e953f73e2ae1894905a99123231bb69ca
                                                              • Instruction Fuzzy Hash: 2A41E3727043016BD710EE29DD81F2BBBD9BBC4B12F14493EF990A62C1D6B8DA04875A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 005674F5
                                                                • Part of subcall function 0056C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0055A843), ref: 0056C49E
                                                              • Sleep.KERNEL32(00000064), ref: 00567521
                                                              • DeleteFileW.KERNEL32(00000000), ref: 00567555
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CreateDeleteExecuteShellSleep
                                                              • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                              • API String ID: 1462127192-2001430897
                                                              • Opcode ID: 147d21fb93897effeecec7586c80ef823822eb551c43b3ddf7e9c3ef71b8faf7
                                                              • Instruction ID: b8cee27a4681d0423a929bd9ae91bd6949d1c3702f0856432f6c443c47c5b47f
                                                              • Opcode Fuzzy Hash: 147d21fb93897effeecec7586c80ef823822eb551c43b3ddf7e9c3ef71b8faf7
                                                              • Instruction Fuzzy Hash: 4531323190011A5ADB04FBA0DCBAEED7F74BF90306F40015AF906670D2EF606D8ECA94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentProcess.KERNEL32(005C2B14,00000000,005C52D8,00003000,00000004,00000000,00000001), ref: 005573DD
                                                              • GetCurrentProcess.KERNEL32(005C2B14,00000000,00008000,?,00000000,00000001,00000000,00557656,C:\Users\user\Desktop\tu.exe), ref: 0055749E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentProcess
                                                              • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                              • API String ID: 2050909247-4242073005
                                                              • Opcode ID: 8ce7cbc540471b63b9beb5adc87f84504514538f891daa38c48710a2fe520aae
                                                              • Instruction ID: 8c948126f60d049050ae19b6950ab39173e57786ef3222d84fe1fd493b0636bb
                                                              • Opcode Fuzzy Hash: 8ce7cbc540471b63b9beb5adc87f84504514538f891daa38c48710a2fe520aae
                                                              • Instruction Fuzzy Hash: 1031F675204B05AFD720EFA5EC5AF56BFB8FB98306F000819F91292251DBB4B80C9B61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0040B391
                                                              • _memset.LIBCMT ref: 0040B3AE
                                                              • GetCurrentProcessId.KERNEL32 ref: 0040B3B6
                                                              • swprintf.LIBCMT ref: 0040B3D6
                                                                • Part of subcall function 00432B41: __vswprintf_s_l.LIBCMT ref: 00432B55
                                                              • GetAtomNameW.KERNEL32(0000C000,?,00000104), ref: 0040B41E
                                                              Strings
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B3C2
                                                              • 1830B7BD-F7A3-4c4d-989B-C004DE465EDE, xrefs: 0040B3BC
                                                              • %s-%d-%s:, xrefs: 0040B3C7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: _memset$AtomCurrentNameProcess__vswprintf_s_lswprintf
                                                              • String ID: %s-%d-%s:$1830B7BD-F7A3-4c4d-989B-C004DE465EDE${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 1762070210-1980942712
                                                              • Opcode ID: 04201b845daf679fd702f084c1f8ee3b84df7fdc10a14036f8850c1365b6ed34
                                                              • Instruction ID: d3ba892406a69276a2d9f1b618fdd1f673d4abaf0ab7cd1099eba7940fe984af
                                                              • Opcode Fuzzy Hash: 04201b845daf679fd702f084c1f8ee3b84df7fdc10a14036f8850c1365b6ed34
                                                              • Instruction Fuzzy Hash: 263189B16043006BD210EB68DC85EABB3E8EF98704F40493FF94593192E775A904879A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 0040BB1A
                                                              • OpenThread.KERNEL32(00000040,00000001,-00000008,00000000,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF), ref: 0040BB75
                                                              • GetLastError.KERNEL32(?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C), ref: 0040BB7B
                                                              • GetProcessHeap.KERNEL32(?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C), ref: 0040BBAA
                                                              • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF), ref: 0040BBB4
                                                              • OutputDebugStringW.KERNEL32(****** ,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC), ref: 0040BBC1
                                                              • CloseHandle.KERNEL32(00000000,?,?,?,0040BA80,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC), ref: 0040BBCA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: HeapThread$CloseCurrentDebugErrorFreeHandleLastOpenOutputProcessString
                                                              • String ID: ******
                                                              • API String ID: 2450575844-1974978773
                                                              • Opcode ID: 4bb51ded7a3608d7d97a1e27c24b296467d0de8f0afda4e18d8d8d35c90d2ed4
                                                              • Instruction ID: ba7dbfe72a5486ef3152b13babee1143b1853603010718cc7a74b18ee6d804c4
                                                              • Opcode Fuzzy Hash: 4bb51ded7a3608d7d97a1e27c24b296467d0de8f0afda4e18d8d8d35c90d2ed4
                                                              • Instruction Fuzzy Hash: FC315A34604B019FC7149B24CC94B6B77A4EF45702F04457EE985A7795E738F8008F9E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00551BF9
                                                              • waveInOpen.WINMM(005C2AC0,000000FF,005C2AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00551C8F
                                                              • waveInPrepareHeader.WINMM(005C2A88,00000020), ref: 00551CE3
                                                              • waveInAddBuffer.WINMM(005C2A88,00000020), ref: 00551CF2
                                                              • waveInStart.WINMM ref: 00551CFE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                              • String ID: dM\$|M\$P\
                                                              • API String ID: 1356121797-2110958601
                                                              • Opcode ID: 8523d25518c7fce6fc5b1396abb72329e8402be45ac7a4aa56d62e7bcc6c43bd
                                                              • Instruction ID: 49f1b953b21459f43370020387182003945e8918c26bdef712d3fc542a3caa97
                                                              • Opcode Fuzzy Hash: 8523d25518c7fce6fc5b1396abb72329e8402be45ac7a4aa56d62e7bcc6c43bd
                                                              • Instruction Fuzzy Hash: 16213D71604A01AFC728AF66AC19E197FA5BFA4711F04402AA509C6AB0DBF00409EB68
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 00409195
                                                              • GetLocalTime.KERNEL32(?), ref: 004091A2
                                                              • __swprintf.LIBCMT ref: 004091C5
                                                              • _vswprintf_s.LIBCMT ref: 004091FD
                                                              • OutputDebugStringW.KERNEL32(?), ref: 00409218
                                                              • OutputDebugStringW.KERNEL32(00462D84), ref: 0040921F
                                                              • OutputDebugStringW.KERNEL32(?), ref: 00409246
                                                              Strings
                                                              • <%08X> %02hu:%02hu:%02hu: , xrefs: 004091BF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: DebugOutputString$CurrentLocalThreadTime__swprintf_vswprintf_s
                                                              • String ID: <%08X> %02hu:%02hu:%02hu:
                                                              • API String ID: 2086888202-2163415560
                                                              • Opcode ID: 13ecc129a4f9194a9cc056268f5a874c4d06aae9f71d9bff6946beeb61dacec8
                                                              • Instruction ID: 8e58f0009974f807aa0a88d16c54b8bf9c07752b702b58f5e1e4d755a66998c4
                                                              • Opcode Fuzzy Hash: 13ecc129a4f9194a9cc056268f5a874c4d06aae9f71d9bff6946beeb61dacec8
                                                              • Instruction Fuzzy Hash: 8721C371504311AFD728EB64DD89AFF73E4EFD8700F804A5EF88986191EA789904C797
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • FindWindowW.USER32(Q360AdvToolExecutorWndClass,360AdvToolExecutor), ref: 0042E263
                                                              • _memset.LIBCMT ref: 0042E28E
                                                              • GetCommandLineW.KERNEL32 ref: 0042E2A0
                                                              • IsWindow.USER32(00000000), ref: 0042E2E8
                                                              • SendMessageTimeoutW.USER32(00000000,0000004A,00000000,00000064,00000001,000007D0,00000000), ref: 0042E319
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Window$CommandFindLineMessageSendTimeout_memset
                                                              • String ID: 360AdvToolExecutor$Q360AdvToolExecutorWndClass$d
                                                              • API String ID: 1428618593-896946901
                                                              • Opcode ID: f952c6319ded637e8a2be25a1d5eb67e1dd8c4e37a3a0c622363d516aaf7f046
                                                              • Instruction ID: be255b2814a9b3d3b0f80194d172021b69f52db360a7e57986c6838927bbd2eb
                                                              • Opcode Fuzzy Hash: f952c6319ded637e8a2be25a1d5eb67e1dd8c4e37a3a0c622363d516aaf7f046
                                                              • Instruction Fuzzy Hash: CF216DB0A403189FDB10DF60DC45B99B7F8BF08705F50C5E9A549A6281DFB4AA88CFD9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0056D476
                                                                • Part of subcall function 0056D50F: RegisterClassExA.USER32(00000030), ref: 0056D55B
                                                                • Part of subcall function 0056D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0056D576
                                                                • Part of subcall function 0056D50F: GetLastError.KERNEL32 ref: 0056D580
                                                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0056D4AD
                                                              • lstrcpynA.KERNEL32(005C4B60,Remcos,00000080), ref: 0056D4C7
                                                              • Shell_NotifyIconA.SHELL32(00000000,005C4B48), ref: 0056D4DD
                                                              • TranslateMessage.USER32(?), ref: 0056D4E9
                                                              • DispatchMessageA.USER32(?), ref: 0056D4F3
                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0056D500
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                              • String ID: Remcos
                                                              • API String ID: 1970332568-165870891
                                                              • Opcode ID: aaaebaac0bc47f5ac9c52a20709a6d1136bdb1e8039e873aff1968eaf76279de
                                                              • Instruction ID: efa9644eb28ac3ae2cb906eca2ef5d7ab01ea7932b52e7a92a0c66af622b8724
                                                              • Opcode Fuzzy Hash: aaaebaac0bc47f5ac9c52a20709a6d1136bdb1e8039e873aff1968eaf76279de
                                                              • Instruction Fuzzy Hash: 05013C71900289AFDF109FA1EC5CF9ABBBCFBA2B09F00441AB511870A0D7B49849DF60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __fileno$__getbuf
                                                              • String ID:
                                                              • API String ID: 3695372198-0
                                                              • Opcode ID: c173f9ec17edaa17f6ee4bf5f7f1f9aa3a8cbada4bbe69cdd912e2c5fecacc7a
                                                              • Instruction ID: 6b936e4868124953b0f543ace5912ab53509dea9887a6f8d0f4e089e0e30c8cc
                                                              • Opcode Fuzzy Hash: c173f9ec17edaa17f6ee4bf5f7f1f9aa3a8cbada4bbe69cdd912e2c5fecacc7a
                                                              • Instruction Fuzzy Hash: 334136325006448BC734AB29D940A6B7390AF57329F24456FEC66D73C2D7BCEE4A874D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00598215: GetLastError.KERNEL32(00000020,?,0058A7F5,?,?,?,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B), ref: 00598219
                                                                • Part of subcall function 00598215: _free.LIBCMT ref: 0059824C
                                                                • Part of subcall function 00598215: SetLastError.KERNEL32(00000000,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B,?,00000041,00000000,00000000), ref: 0059828D
                                                                • Part of subcall function 00598215: _abort.LIBCMT ref: 00598293
                                                              • _memcmp.LIBVCRUNTIME ref: 00595423
                                                              • _free.LIBCMT ref: 00595494
                                                              • _free.LIBCMT ref: 005954AD
                                                              • _free.LIBCMT ref: 005954DF
                                                              • _free.LIBCMT ref: 005954E8
                                                              • _free.LIBCMT ref: 005954F4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorLast$_abort_memcmp
                                                              • String ID: C
                                                              • API String ID: 1679612858-1037565863
                                                              • Opcode ID: 60621cfdcf1a326145c4af2b4788d2734fb9076813cf32b06e64e233ac43fb03
                                                              • Instruction ID: 78060113fd113d699b85cc5d27ad2b8ea212280020886130b15581c0844bc0b1
                                                              • Opcode Fuzzy Hash: 60621cfdcf1a326145c4af2b4788d2734fb9076813cf32b06e64e233ac43fb03
                                                              • Instruction Fuzzy Hash: 32B13A7590161A9FDF25DF18C888BADBBB4FF48304F5045AAE949A7351E770AE90CF40
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: tcp$udp
                                                              • API String ID: 0-3725065008
                                                              • Opcode ID: 75f7fc580154137afae4dfffcfb91536c4bd571ce3b5715f087e7a9a558849b1
                                                              • Instruction ID: 784930c1e46801cbaf65fc2332819091616fb0488100c8c79973d47255c9e7f0
                                                              • Opcode Fuzzy Hash: 75f7fc580154137afae4dfffcfb91536c4bd571ce3b5715f087e7a9a558849b1
                                                              • Instruction Fuzzy Hash: 1C715570A483429FDB24DF58C484A2ABFE5FB99345F14482EF88587261EB74CD44CF92
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(?,?), ref: 0040532D
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040536F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FileSizeUnothrow_t@std@@@__ehfuncinfo$??2@
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$SetFilePointerEx()
                                                              • API String ID: 1756747699-2561355867
                                                              • Opcode ID: 045e6cca237012a5d873fd085605a78d8d810dd21c2544b345ca439df9fc10a8
                                                              • Instruction ID: bf7b32a8e1ee1daeb80faca7c9eea0b1b867eadaca1b8f7f38da0fe90859c255
                                                              • Opcode Fuzzy Hash: 045e6cca237012a5d873fd085605a78d8d810dd21c2544b345ca439df9fc10a8
                                                              • Instruction Fuzzy Hash: 1F51E270740B016BE318EF24DC81FA7B3A4FB84714F54453EE908937C1E7B9A8548A99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __Init_thread_footer.LIBCMT ref: 005518BE
                                                              • ExitThread.KERNEL32 ref: 005518F6
                                                              • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,005C4EE0,00000000), ref: 00551A04
                                                                • Part of subcall function 00584770: __onexit.LIBCMT ref: 00584776
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                              • String ID: Pk\$XM\$N\$N\
                                                              • API String ID: 1649129571-2776330165
                                                              • Opcode ID: 58f2c06e83c732a8ef4c780507030a7c63c7fdb3ac1e4ff2c45c762a1ab81944
                                                              • Instruction ID: 80c618613ceb5920c700c5e27780fce9f1086e2b16fe6b2f1fc1592b2c224259
                                                              • Opcode Fuzzy Hash: 58f2c06e83c732a8ef4c780507030a7c63c7fdb3ac1e4ff2c45c762a1ab81944
                                                              • Instruction Fuzzy Hash: A1419E311046014AC724FB24ECAAEAE7FA5BFD5316F40092EF846861E2DF305D4E9B56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,005C4EE0,005B5FA4,?,00000000,00557FFC,00000000), ref: 005579C5
                                                              • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00557FFC,00000000,?,?,0000000A,00000000), ref: 00557A0D
                                                                • Part of subcall function 00554AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00554B36
                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00557FFC,00000000,?,?,0000000A,00000000), ref: 00557A4D
                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00557A6A
                                                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00557A95
                                                              • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00557AA5
                                                                • Part of subcall function 00554B96: WaitForSingleObject.KERNEL32(?,000000FF,?,005C4EF8,00554C49,00000000,?,?,?,005C4EF8,?), ref: 00554BA5
                                                                • Part of subcall function 00554B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0055548B), ref: 00554BC3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                              • String ID: .part
                                                              • API String ID: 1303771098-3499674018
                                                              • Opcode ID: 1f9f93ec445725dad4789207605c8e5f6697469a02ff7bd578a7074f14510c7b
                                                              • Instruction ID: 9f7dfcaa06f787a3b4f9c27eeab2ccf54d5e1047c68c58b07c2e5023accf5bdd
                                                              • Opcode Fuzzy Hash: 1f9f93ec445725dad4789207605c8e5f6697469a02ff7bd578a7074f14510c7b
                                                              • Instruction Fuzzy Hash: 3731A4314083159FC710EB20DC6999FBBA8FFD4356F40491EB84692151EB70AE4CCBA6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0040B56E
                                                              • _memset.LIBCMT ref: 0040B58B
                                                              • GetCurrentProcessId.KERNEL32 ref: 0040B593
                                                              • swprintf.LIBCMT ref: 0040B5AF
                                                                • Part of subcall function 00432B41: __vswprintf_s_l.LIBCMT ref: 00432B55
                                                              • GetAtomNameW.KERNEL32(0000C000,?,00000104), ref: 0040B5EE
                                                              Strings
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B59B
                                                              • %s-%d-%s:, xrefs: 0040B5A0
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: _memset$AtomCurrentNameProcess__vswprintf_s_lswprintf
                                                              • String ID: %s-%d-%s:${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 1762070210-3571227826
                                                              • Opcode ID: 82fb826cdcdc4336f7a5b576b1eafced99041a18518562a134d50a0958fb8c3e
                                                              • Instruction ID: cbba3bbbb2408f3d45a6993105ac790f0c08af2375fe902b13238ad858c14082
                                                              • Opcode Fuzzy Hash: 82fb826cdcdc4336f7a5b576b1eafced99041a18518562a134d50a0958fb8c3e
                                                              • Instruction Fuzzy Hash: 4121A9726043046BD320EB54DC85AFBB398DF84714F44493EFA4597181EA79A90487DE
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0040B4C9
                                                              • GetCurrentProcessId.KERNEL32 ref: 0040B4D1
                                                              • swprintf.LIBCMT ref: 0040B4F2
                                                                • Part of subcall function 00432B41: __vswprintf_s_l.LIBCMT ref: 00432B55
                                                              • AddAtomW.KERNEL32(?), ref: 0040B4FF
                                                              Strings
                                                              • %s-%d-%s:%s, xrefs: 0040B4E3
                                                              • {A0972F10-452C-4cd1-904E-B50E394EDE34}, xrefs: 0040B4DE
                                                              • 1830B7BD-F7A3-4c4d-989B-C004DE465EDE, xrefs: 0040B4D8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AtomCurrentProcess__vswprintf_s_l_memsetswprintf
                                                              • String ID: %s-%d-%s:%s$1830B7BD-F7A3-4c4d-989B-C004DE465EDE${A0972F10-452C-4cd1-904E-B50E394EDE34}
                                                              • API String ID: 1330282167-1301288515
                                                              • Opcode ID: 5475c2726ad21a62d9e50e63b03a8a0c46f1695309ac880fdee57f2ad6116d02
                                                              • Instruction ID: 49f90f98050547606b8eda84904ebd6c00acf6bbc8e1d7b343d1764b10b85a19
                                                              • Opcode Fuzzy Hash: 5475c2726ad21a62d9e50e63b03a8a0c46f1695309ac880fdee57f2ad6116d02
                                                              • Instruction Fuzzy Hash: 0E0149B16403007BD300EF61DC86ABBB3A8EF94B04F80083BB994C2181FAF8E404479A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0057DD01,?,?,?,0059AE9A,00000001,00000001,?), ref: 0059ACA3
                                                              • __alloca_probe_16.LIBCMT ref: 0059ACDB
                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0057DD01,?,?,?,0059AE9A,00000001,00000001,?), ref: 0059AD29
                                                              • __alloca_probe_16.LIBCMT ref: 0059ADC0
                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0059AE23
                                                              • __freea.LIBCMT ref: 0059AE30
                                                                • Part of subcall function 00596137: RtlAllocateHeap.NTDLL(00000000,0058529C,?,?,00588847,?,?,00000000,?,?,0055DE62,0058529C,?,?,?,?), ref: 00596169
                                                              • __freea.LIBCMT ref: 0059AE39
                                                              • __freea.LIBCMT ref: 0059AE5E
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 3864826663-0
                                                              • Opcode ID: b6de9d51c9809231ee9676e5cb0d8581d6d4a5fdfdc4727e8c040ab9558888dc
                                                              • Instruction ID: 9e840125420312e573bfc008123ea2b93da683bdecec26e4659750769b018801
                                                              • Opcode Fuzzy Hash: b6de9d51c9809231ee9676e5cb0d8581d6d4a5fdfdc4727e8c040ab9558888dc
                                                              • Instruction Fuzzy Hash: 4351BF72600216ABDF259F64CC45EBB7FAEFB84750F194629FD05DA140EB34DC8086A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 005699CC
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 005699ED
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00569A0D
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00569A21
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000,00000000), ref: 00569A37
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00569A54
                                                              • SendInput.USER32(00000001,?,0000001C,?,?,00000000), ref: 00569A6F
                                                              • SendInput.USER32(00000001,?,0000001C,?,00000000), ref: 00569A8B
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InputSend
                                                              • String ID:
                                                              • API String ID: 3431551938-0
                                                              • Opcode ID: cc243fc30a8b5de77c36eb9feac25697a5c6e8898f66afcc6af33aa4d9043224
                                                              • Instruction ID: f62f7989beaa52b34fb31cca21240d27f5ac43c3c9214fc6ad8e677ae80b6937
                                                              • Opcode Fuzzy Hash: cc243fc30a8b5de77c36eb9feac25697a5c6e8898f66afcc6af33aa4d9043224
                                                              • Instruction Fuzzy Hash: B0318031558308AEE311CF51D941BEBBFDCEF98B54F00080FF6809B191D2B295898BA7
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __freea$__alloca_probe_16_free
                                                              • String ID: a/p$am/pm$zY
                                                              • API String ID: 2936374016-3243681459
                                                              • Opcode ID: 9c5ccf7b606a3bd2f54f35a1ed02122f28954f9489f98edfaf298cc05f80ee0b
                                                              • Instruction ID: c7fc4a95805de11226d44c48ef28903fc4dccadd5afb639ebec0044dc8761316
                                                              • Opcode Fuzzy Hash: 9c5ccf7b606a3bd2f54f35a1ed02122f28954f9489f98edfaf298cc05f80ee0b
                                                              • Instruction Fuzzy Hash: 7FD1F43192820ECADF289F68C849BBABFB5FF09700F24455BE945AB255D3359D40CBA1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _free.LIBCMT ref: 00599212
                                                              • _free.LIBCMT ref: 00599236
                                                              • _free.LIBCMT ref: 005993BD
                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,005AF234), ref: 005993CF
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,005C2764,000000FF,00000000,0000003F,00000000,?,?), ref: 00599447
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,005C27B8,000000FF,?,0000003F,00000000,?), ref: 00599474
                                                              • _free.LIBCMT ref: 00599589
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                              • String ID:
                                                              • API String ID: 314583886-0
                                                              • Opcode ID: 3ed368f293ef95d712da1541df462c5c815bfd663d8d696165c8fcfbb89c442e
                                                              • Instruction ID: 95845b9d1394400ad62a3cdc03ee460a1b46580b336f8d55499e2d957ec32328
                                                              • Opcode Fuzzy Hash: 3ed368f293ef95d712da1541df462c5c815bfd663d8d696165c8fcfbb89c442e
                                                              • Instruction Fuzzy Hash: 6BC12775900246AFDF219F6C8C45AAEBFF8FF96310F1405AEE89497281EB308E46D750
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00563ABC
                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00563AEB
                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00563B8B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Enum$InfoQueryValue
                                                              • String ID: [regsplt]$xU\$T\
                                                              • API String ID: 3554306468-2864833391
                                                              • Opcode ID: ea23a2d16ee7e0bde8f2dc3d4a7cb91587f13730e027443b35f62d0473e66b07
                                                              • Instruction ID: 407f0a1cf778af1f3a127c88e6d32e247d3da31916dbd9d43f810e6b8370e44e
                                                              • Opcode Fuzzy Hash: ea23a2d16ee7e0bde8f2dc3d4a7cb91587f13730e027443b35f62d0473e66b07
                                                              • Instruction Fuzzy Hash: 2D510D71900119AADB14EBE4DC99EEFBFBDBF55305F500166F906A2091EF706B48CBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0059BB31,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0059B3FE
                                                              • __fassign.LIBCMT ref: 0059B479
                                                              • __fassign.LIBCMT ref: 0059B494
                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0059B4BA
                                                              • WriteFile.KERNEL32(?,FF8BC35D,00000000,0059BB31,00000000,?,?,?,?,?,?,?,?,?,0059BB31,?), ref: 0059B4D9
                                                              • WriteFile.KERNEL32(?,?,00000001,0059BB31,00000000,?,?,?,?,?,?,?,?,?,0059BB31,?), ref: 0059B512
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                              • String ID:
                                                              • API String ID: 1324828854-0
                                                              • Opcode ID: dfc667d696f2c57dbf5992acd06087ca9cf2d1eb195dd593b8c66a18f28b4406
                                                              • Instruction ID: b3326495bcafa32527f81010b071e9c9701a7a4baadbf2d22f3cbd4c855fc330
                                                              • Opcode Fuzzy Hash: dfc667d696f2c57dbf5992acd06087ca9cf2d1eb195dd593b8c66a18f28b4406
                                                              • Instruction Fuzzy Hash: FB51C470900209AFEF10CFA8ED85AEEBBF8FF19300F15455AE955E7291E7709A44CB60
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free
                                                              • String ID: D[Z$D[Z
                                                              • API String ID: 269201875-3018883146
                                                              • Opcode ID: e7a74acdb18084c3f784572c46c164020b4932660a9c1a286dcaf728e36473d4
                                                              • Instruction ID: 4e9b1f3a125f5e7865ebeddeaaa65d97a7073b7aeb2f9f1bcdc4cc98f6643b67
                                                              • Opcode Fuzzy Hash: e7a74acdb18084c3f784572c46c164020b4932660a9c1a286dcaf728e36473d4
                                                              • Instruction Fuzzy Hash: F841E631B001166ADF256BB88C8ABAE3FA8FF873B0F1D0615F424D61D1EA748D4156A1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,000000CC,?,?,?,?,?,0040519E,?,?), ref: 00404576
                                                              • ReadFile.KERNEL32(?,?,00000008,?,00000000,?,?,?,?,?,0040519E,?,?,00000001,00000000), ref: 00404593
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$PointerRead
                                                              • String ID: .\QHImageHlp.c$ReadFile()$SetFilePointerEx()
                                                              • API String ID: 3154509469-2897820174
                                                              • Opcode ID: 56332d5397ddc3112434a387f4fff7781493f3edbc103fc4514e60ab288b49f8
                                                              • Instruction ID: a7ba87d3e4fafd734ddcf6f3cd13cbc0dee90a629a9315bd97f3778bfee0730c
                                                              • Opcode Fuzzy Hash: 56332d5397ddc3112434a387f4fff7781493f3edbc103fc4514e60ab288b49f8
                                                              • Instruction Fuzzy Hash: 1E4173B0644301ABD610DF11D981A2B73E8EBC9745F404D3FFA85A72C0FBB999058B5B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • std::_Iterator_base::_Iterator_base.LIBCPMTD ref: 0040C159
                                                                • Part of subcall function 0040C4D0: _DebugHeapAllocator.LIBCPMTD ref: 0040C4E0
                                                              • CoInitialize.OLE32(00000000), ref: 0040C19E
                                                                • Part of subcall function 0042E240: FindWindowW.USER32(Q360AdvToolExecutorWndClass,360AdvToolExecutor), ref: 0042E263
                                                                • Part of subcall function 0042E240: _memset.LIBCMT ref: 0042E28E
                                                                • Part of subcall function 0042E240: GetCommandLineW.KERNEL32 ref: 0042E2A0
                                                                • Part of subcall function 0042E240: IsWindow.USER32(00000000), ref: 0042E2E8
                                                                • Part of subcall function 0042E240: SendMessageTimeoutW.USER32(00000000,0000004A,00000000,00000064,00000001,000007D0,00000000), ref: 0042E319
                                                              Strings
                                                              • \360Util.dll, xrefs: 0040C15E
                                                              • Q360SafeMutex_Q360AdvToolExecutorMutex, xrefs: 0040C1A7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Window$AllocatorCommandDebugFindHeapInitializeIterator_baseIterator_base::_LineMessageSendTimeout_memsetstd::_
                                                              • String ID: Q360SafeMutex_Q360AdvToolExecutorMutex$\360Util.dll
                                                              • API String ID: 2683895894-2924836915
                                                              • Opcode ID: d3b5a0732abc0df9c812d955e8ee18da3f166e572647cfff1f4a083dca471343
                                                              • Instruction ID: 2be0485e52df47f87d2654ae8b8a047a1d11b9ef034e44ab1b14c8653dacfca3
                                                              • Opcode Fuzzy Hash: d3b5a0732abc0df9c812d955e8ee18da3f166e572647cfff1f4a083dca471343
                                                              • Instruction Fuzzy Hash: 53410070D10108EBCB04EBE5DC92AED7778AF14308F4045AEE902771D1EF786A09CB69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000000), ref: 00404D95
                                                              • WriteFile.KERNEL32(?,?,00000008,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00404DAE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$PointerWrite
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()$WriteFile()
                                                              • API String ID: 539440098-3552954839
                                                              • Opcode ID: 430e23e13aa7738b3b1f8b4cdc884e8e9eda3a3689b7ea57677f209dda7beab1
                                                              • Instruction ID: 549b3c329b9650cef16aae18e47ccf49b9e830f2323170fbef0b8720ceabb87a
                                                              • Opcode Fuzzy Hash: 430e23e13aa7738b3b1f8b4cdc884e8e9eda3a3689b7ea57677f209dda7beab1
                                                              • Instruction Fuzzy Hash: 2821A5B67007006BE310DA299C82FB77398EBC4711F44483FFA54E22D1F6BDD90986A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0056361B: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,005C50E4), ref: 0056363D
                                                                • Part of subcall function 0056361B: RegQueryValueExW.ADVAPI32(?,0055F313,00000000,00000000,?,00000400), ref: 0056365C
                                                                • Part of subcall function 0056361B: RegCloseKey.ADVAPI32(?), ref: 00563665
                                                                • Part of subcall function 0056BFB7: GetCurrentProcess.KERNEL32(?,?,?,0055DAAA,WinDir,00000000,00000000), ref: 0056BFC8
                                                              • _wcslen.LIBCMT ref: 0056B763
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                              • String ID: .exe$8S\$http\shell\open\command$program files (x86)\$program files\
                                                              • API String ID: 37874593-1755051579
                                                              • Opcode ID: d59cb19618a90f7928f40f186de2c927bad438f6480385015a174321c884e152
                                                              • Instruction ID: e7a6f7615f3f86be4b73a2d945018cae93ba90b96525fe0f014a790b72dcffa2
                                                              • Opcode Fuzzy Hash: d59cb19618a90f7928f40f186de2c927bad438f6480385015a174321c884e152
                                                              • Instruction Fuzzy Hash: BB218861A0010567DF14BAB48CAAEFE7E6DBFC5325F04053EF806A7282EE24AD0D4764
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(00000005,00000000,?,00065844,004089BF,?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 00408BC8
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408BE6
                                                              • _wcschr.LIBCMT ref: 00408C1B
                                                              • _wcschr.LIBCMT ref: 00408C3E
                                                              • __snwprintf.LIBCMT ref: 00408CAD
                                                              Strings
                                                              • %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s, xrefs: 00408C9C
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_wcschr$__getptd_noexit__snwprintf
                                                              • String ID: %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s
                                                              • API String ID: 2287154907-1296420124
                                                              • Opcode ID: fee108e2de2b253099acefbf970527ccea13f099144c85f6f397bf0c900a826a
                                                              • Instruction ID: 172b17a69a1951cee07f9fb1351cdc207f06d73bc90140ef39942ad08a7788cd
                                                              • Opcode Fuzzy Hash: fee108e2de2b253099acefbf970527ccea13f099144c85f6f397bf0c900a826a
                                                              • Instruction Fuzzy Hash: 5A21B6B2500714ABD3209B65DD45FB7B3F8EF48741F00842EF98987281EB7CA8008774
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ceb37b8dc32453dc6fbefc8deb1ce5ecd1de519bef159c85ec724c7c626b42a1
                                                              • Instruction ID: a2cf50e0d5a9b5fc5e5b1fdf2d9bd3f7104a89ed5527f4e2e4134766ab516615
                                                              • Opcode Fuzzy Hash: ceb37b8dc32453dc6fbefc8deb1ce5ecd1de519bef159c85ec724c7c626b42a1
                                                              • Instruction Fuzzy Hash: 9611AF7250422ABFDF202FB68C08A6F7EACFFD2730B154A15B851D6291DA308C4596B0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00561170
                                                              • int.LIBCPMT ref: 00561183
                                                                • Part of subcall function 0055E0C1: std::_Lockit::_Lockit.LIBCPMT ref: 0055E0D2
                                                                • Part of subcall function 0055E0C1: std::_Lockit::~_Lockit.LIBCPMT ref: 0055E0EC
                                                              • std::_Facet_Register.LIBCPMT ref: 005611C3
                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 005611CC
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 005611EA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                              • String ID: (m\
                                                              • API String ID: 2536120697-2073151103
                                                              • Opcode ID: 1fc13177b2c889100127a8b875dac1f84b751656fdaa2ccef1570fcc1f8023b5
                                                              • Instruction ID: c68e13bf6ef4f222a9f352f7ea7d429bdd85a4134d99ef9385b6a48e9e9f06ec
                                                              • Opcode Fuzzy Hash: 1fc13177b2c889100127a8b875dac1f84b751656fdaa2ccef1570fcc1f8023b5
                                                              • Instruction Fuzzy Hash: DF11E732900519ABCB14FBA4D81ACADBFB8BF81350B14055AFD05A7291EF309E44C7D0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,0058A351,005892BE), ref: 0058A368
                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0058A376
                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0058A38F
                                                              • SetLastError.KERNEL32(00000000,?,0058A351,005892BE), ref: 0058A3E1
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastValue___vcrt_
                                                              • String ID:
                                                              • API String ID: 3852720340-0
                                                              • Opcode ID: 4f08fc8029119c50f5909cbcda06ee3e1388c0f4fbaca81dc04d0de958509410
                                                              • Instruction ID: f7c9ddd15ee332c301bbe5a7718b385d9f994ce866ee6947ac766abdda4bfbf9
                                                              • Opcode Fuzzy Hash: 4f08fc8029119c50f5909cbcda06ee3e1388c0f4fbaca81dc04d0de958509410
                                                              • Instruction Fuzzy Hash: B801B53210CB525FB61536786C8DA7B2F48FB537B5720072AF914741E1EF524C446385
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Users\user\Desktop\tu.exe), ref: 005575D0
                                                                • Part of subcall function 005574FD: _wcslen.LIBCMT ref: 00557521
                                                                • Part of subcall function 005574FD: CoGetObject.OLE32(?,00000024,005B6518,00000000), ref: 00557582
                                                              • CoUninitialize.OLE32 ref: 00557629
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: InitializeObjectUninitialize_wcslen
                                                              • String ID: C:\Users\user\Desktop\tu.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                              • API String ID: 3851391207-665246844
                                                              • Opcode ID: e64150d5ec461ac1983aff29124da3618fd9c87dfd143acd7faa2d02df840f07
                                                              • Instruction ID: 439d814b63f639deee5bdc31ad0b24757bf88c08c2ba9b17721e08f99e79c197
                                                              • Opcode Fuzzy Hash: e64150d5ec461ac1983aff29124da3618fd9c87dfd143acd7faa2d02df840f07
                                                              • Instruction Fuzzy Hash: 2501DE723086196FE6245B65FC6EFAB7F48FB89726F10042FFD0186182EB90AC084661
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0055BADD
                                                              • GetLastError.KERNEL32 ref: 0055BAE7
                                                              Strings
                                                              • [Chrome Cookies found, cleared!], xrefs: 0055BB0D
                                                              • [Chrome Cookies not found], xrefs: 0055BB01
                                                              • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0055BAA8
                                                              • UserProfile, xrefs: 0055BAAD
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DeleteErrorFileLast
                                                              • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                              • API String ID: 2018770650-304995407
                                                              • Opcode ID: e461ddcd034508139ea109e17ec3292c62074193c336af5644743dbf657760db
                                                              • Instruction ID: 3087b986fe07124ed4340532f54a3dd2b5b44d56355c26f6ed07cb419b54bfbf
                                                              • Opcode Fuzzy Hash: e461ddcd034508139ea109e17ec3292c62074193c336af5644743dbf657760db
                                                              • Instruction Fuzzy Hash: EA01A231A4010A9B9A04B7B9DC7F8FE7F24BD52712B400117FC02631E6EE515A0D9692
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Name::operator+$ArgumentDecorator::getNameName::Typesoperator+
                                                              • String ID: throw(
                                                              • API String ID: 4203687869-3159766648
                                                              • Opcode ID: 65a34e9b409ec9004d59ea8c39782607beeff06af4b3fea58027fa1141fbf606
                                                              • Instruction ID: 428951cbcfe74a0240c373cc1e93f32a0656e90a4d407b596630d3e776d7e093
                                                              • Opcode Fuzzy Hash: 65a34e9b409ec9004d59ea8c39782607beeff06af4b3fea58027fa1141fbf606
                                                              • Instruction Fuzzy Hash: 8B01AC75640208AFDF00EF64DC46FAE37B5EB84709F008057F901AB291D679EA058789
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __allrem.LIBCMT ref: 0058AC69
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0058AC85
                                                              • __allrem.LIBCMT ref: 0058AC9C
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0058ACBA
                                                              • __allrem.LIBCMT ref: 0058ACD1
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0058ACEF
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                              • String ID:
                                                              • API String ID: 1992179935-0
                                                              • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                              • Instruction ID: 42bd430be9eb4fc24c506cfedab11d3b4191ad85aefe5b3ebfb3690aefcfc472
                                                              • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                              • Instruction Fuzzy Hash: B781F772A017079BF724BE68CC45B6ABBE9BF84320F24452BF914E7681EB74DD408751
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Sleep.KERNEL32(00000000,0055D262), ref: 005544C4
                                                                • Part of subcall function 00554607: __EH_prolog.LIBCMT ref: 0055460C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: H_prologSleep
                                                              • String ID: CloseCamera$FreeFrame$GetFrame$HN\$OpenCamera
                                                              • API String ID: 3469354165-3415887970
                                                              • Opcode ID: 78702a343de5787e262ccf117f67afecabf69dff4f788b00f62fd6671c39e9ed
                                                              • Instruction ID: 31722839ba5e35a07c30bd8e6d807e85254bb9e47e3787090dc0c96fac8ceda6
                                                              • Opcode Fuzzy Hash: 78702a343de5787e262ccf117f67afecabf69dff4f788b00f62fd6671c39e9ed
                                                              • Instruction Fuzzy Hash: 1551D235A046025BCA24FB749C7EB6E3F59BBD1746F00041AFC0547A92EF249A4DCBA6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0056179C: SetLastError.KERNEL32(0000000D,00561D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00561CFA), ref: 005617A2
                                                              • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00561CFA), ref: 00561D37
                                                              • GetNativeSystemInfo.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00561CFA), ref: 00561DA5
                                                              • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00561DC9
                                                                • Part of subcall function 00561CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00561DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 00561CB3
                                                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00561E10
                                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00561E17
                                                              • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00561F2A
                                                                • Part of subcall function 00562077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00561F37,?,?,?,?,?), ref: 005620E7
                                                                • Part of subcall function 00562077: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 005620EE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                              • String ID:
                                                              • API String ID: 3950776272-0
                                                              • Opcode ID: 23edd0a071ad9375fa3cc62b1ef734c5c298ae634c643c08caa0d6513bec3dad
                                                              • Instruction ID: a8a653058c71fa09581f94e896d7c7eb1a9d2843311e50c2ea0b57232e5de878
                                                              • Opcode Fuzzy Hash: 23edd0a071ad9375fa3cc62b1ef734c5c298ae634c643c08caa0d6513bec3dad
                                                              • Instruction Fuzzy Hash: 3361F170600A11ABD750AF25C985B7ABFA9FF84340F0C4519FD058B282EBB4DC54CBE8
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __cftoe
                                                              • String ID:
                                                              • API String ID: 4189289331-0
                                                              • Opcode ID: 4b66811ec266f3d33220ea29ee449ce7a62fdb42ad339d6ad60e6740db9cfd2e
                                                              • Instruction ID: 06fd52e8ea2965724f08ececce49062f711f4b9fdef86452bdaeb899626082ee
                                                              • Opcode Fuzzy Hash: 4b66811ec266f3d33220ea29ee449ce7a62fdb42ad339d6ad60e6740db9cfd2e
                                                              • Instruction Fuzzy Hash: D751C832900606ABEF269B68C885EAE7FA9FF89331F144219F81596182FB35DD10C764
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C,00000000,00000000), ref: 0040BA69
                                                              • __CxxThrowException@8.LIBCMT ref: 0040BA99
                                                              • TlsSetValue.KERNEL32(?,00000000,?,?,?,?,?,?,0045B0F0,000000FF,?,004083AC,?,00403F3C,00000000,00000000), ref: 0040BAAE
                                                              • __CxxThrowException@8.LIBCMT ref: 0040BAC8
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw$ObjectSingleValueWait
                                                              • String ID:
                                                              • API String ID: 2586364301-0
                                                              • Opcode ID: 16afd0f5b96ec433a7f44ac714009dcb17a785963acd1a11252a5c6dbd44d47e
                                                              • Instruction ID: 82b94f8ae3ea0c74fc68bf355bcced71143dc14b0de1f656a462604ca47169f4
                                                              • Opcode Fuzzy Hash: 16afd0f5b96ec433a7f44ac714009dcb17a785963acd1a11252a5c6dbd44d47e
                                                              • Instruction Fuzzy Hash: 50317271B046049BCB10DB699984A6FB7B4EB44724F20466AE415F33D1E7799D008FD9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0056A38E,00000000), ref: 0056AC88
                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0056A38E,00000000), ref: 0056AC9C
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0056A38E,00000000), ref: 0056ACA9
                                                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0056A38E,00000000), ref: 0056ACDE
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0056A38E,00000000), ref: 0056ACF0
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0056A38E,00000000), ref: 0056ACF3
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                              • String ID:
                                                              • API String ID: 493672254-0
                                                              • Opcode ID: 11227860947522182d562a78eee6d8b4a26512485c7ec856a286c2f6912e0cb8
                                                              • Instruction ID: 3363288d508be401e6305a486a58210736e690182791fb805c2003e8f492632e
                                                              • Opcode Fuzzy Hash: 11227860947522182d562a78eee6d8b4a26512485c7ec856a286c2f6912e0cb8
                                                              • Instruction Fuzzy Hash: D701D2311441257BE6105B389C4EFBB3E6CFB433B0F100216F926A71C0DA609E49A9A6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(00000020,?,0058A7F5,?,?,?,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B), ref: 00598219
                                                              • _free.LIBCMT ref: 0059824C
                                                              • _free.LIBCMT ref: 00598274
                                                              • SetLastError.KERNEL32(00000000,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B,?,00000041,00000000,00000000), ref: 00598281
                                                              • SetLastError.KERNEL32(00000000,0058F9A8,?,?,00000020,00000000,?,?,?,0057DD01,0000003B,?,00000041,00000000,00000000), ref: 0059828D
                                                              • _abort.LIBCMT ref: 00598293
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$_free$_abort
                                                              • String ID:
                                                              • API String ID: 3160817290-0
                                                              • Opcode ID: d41589dacb002ac3a05a8e0ad1b3de5e6941add3155c6a297ee1fee03159bb01
                                                              • Instruction ID: 5fc881c696c94ae04e3704ba5bab9edea893e3a7fe43b1215359c617286cc31f
                                                              • Opcode Fuzzy Hash: d41589dacb002ac3a05a8e0ad1b3de5e6941add3155c6a297ee1fee03159bb01
                                                              • Instruction Fuzzy Hash: FDF0F43D104E022ACE1233286C4DF7B2E19FFD37A5F280618F92492192EF288C09A1A0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0056A623,00000000), ref: 0056AAB5
                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0056A623,00000000), ref: 0056AAC9
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A623,00000000), ref: 0056AAD6
                                                              • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0056A623,00000000), ref: 0056AAE5
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A623,00000000), ref: 0056AAF7
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A623,00000000), ref: 0056AAFA
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                              • String ID:
                                                              • API String ID: 221034970-0
                                                              • Opcode ID: aa3bf56ccdf3d7974645b2f6f9c32e905b50a73b9d9b38921c5a81c164953d58
                                                              • Instruction ID: d8069fd92096ce66e57ed5d66a16a897e83ef76701d2b5ed96265ff6e45cee04
                                                              • Opcode Fuzzy Hash: aa3bf56ccdf3d7974645b2f6f9c32e905b50a73b9d9b38921c5a81c164953d58
                                                              • Instruction Fuzzy Hash: 54F0C2315402286BD710AB64AC4DEBB7FACFF96291F000016FD0997141DB649D49AAF1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0056A5A3,00000000), ref: 0056ABB9
                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0056A5A3,00000000), ref: 0056ABCD
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A5A3,00000000), ref: 0056ABDA
                                                              • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0056A5A3,00000000), ref: 0056ABE9
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A5A3,00000000), ref: 0056ABFB
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A5A3,00000000), ref: 0056ABFE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                              • String ID:
                                                              • API String ID: 221034970-0
                                                              • Opcode ID: c97be9a94693c2fff0f05fc0c7edd8674cc6a999180f8497a900d5f63afc2117
                                                              • Instruction ID: 385084755456c5f77f5983c4a9a0911cacd31f12a74e6248fbdf193a31825c1f
                                                              • Opcode Fuzzy Hash: c97be9a94693c2fff0f05fc0c7edd8674cc6a999180f8497a900d5f63afc2117
                                                              • Instruction Fuzzy Hash: CFF0C2315001286BD610AB349C4DEBB3FACFF96391F500016FE0997141DB249D09A9F5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0056A523,00000000), ref: 0056AC20
                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0056A523,00000000), ref: 0056AC34
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A523,00000000), ref: 0056AC41
                                                              • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0056A523,00000000), ref: 0056AC50
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A523,00000000), ref: 0056AC62
                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0056A523,00000000), ref: 0056AC65
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Service$CloseHandle$Open$ControlManager
                                                              • String ID:
                                                              • API String ID: 221034970-0
                                                              • Opcode ID: 6922cbdf38e4adbf14e4742d034778daf4795194594dbfc735820a580f62281f
                                                              • Instruction ID: fe71940e3c4774b00e46bff0e469ea4d5ad2fec698a7fb21c8f99c53da7c5c41
                                                              • Opcode Fuzzy Hash: 6922cbdf38e4adbf14e4742d034778daf4795194594dbfc735820a580f62281f
                                                              • Instruction Fuzzy Hash: 7DF0C2315001286BD210AB34AC4DEBB3FACFF96291F000016FE0997140DB349D49A9F5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 004029F3
                                                              • _malloc.LIBCMT ref: 00402AF5
                                                              • SetLastError.KERNEL32(00000008,00002000), ref: 00402B05
                                                                • Part of subcall function 004050D0: _malloc.LIBCMT ref: 004050DC
                                                                • Part of subcall function 004050D0: SetLastError.KERNEL32(00000008,?,00402A5E,?,00002000), ref: 004050EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_malloc$_memset
                                                              • String ID: .\QHCheckCertificate.c$`"F
                                                              • API String ID: 1834304950-2309566295
                                                              • Opcode ID: 7ed07e5735caa85ddfcceed7d1779d4573f8b94b652b00a3a12b9954510cbd8c
                                                              • Instruction ID: 921698dc5f8c579624ca89809a31f904028b7c0024d22f220bc3dc5a3c6b6cd7
                                                              • Opcode Fuzzy Hash: 7ed07e5735caa85ddfcceed7d1779d4573f8b94b652b00a3a12b9954510cbd8c
                                                              • Instruction Fuzzy Hash: 5BB16AB19083019BE720DF25C58875BB7E4AF84344F04493EF899A62D1E7B8E949CB97
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 0040243D
                                                              • SetLastError.KERNEL32(00000008), ref: 0040244D
                                                                • Part of subcall function 00404EF0: _malloc.LIBCMT ref: 00404EFC
                                                                • Part of subcall function 00404EF0: SetLastError.KERNEL32(00000008,00000003,004023AF,00000000), ref: 00404F0E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_malloc
                                                              • String ID: .\QHCheckCertificate.c$X!F$`"F
                                                              • API String ID: 1018170914-3988528553
                                                              • Opcode ID: ced2b3246bb548433fe6192039cd183e0597671a36ff0efda0a7d5906754ef41
                                                              • Instruction ID: ffef2bb2e26d9b2751a906ac4d56d605a7bea727a65ec4aa2e850bc7b12c3673
                                                              • Opcode Fuzzy Hash: ced2b3246bb548433fe6192039cd183e0597671a36ff0efda0a7d5906754ef41
                                                              • Instruction Fuzzy Hash: 57918CB05083019BD710DF25D95476BB7E4BB88348F04493EF889A73C1E7B9D90ACB9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 0040591B
                                                              • SetLastError.KERNEL32(00000008,?), ref: 0040592D
                                                                • Part of subcall function 004046F0: GetFileSizeEx.KERNEL32(?,?,?,?,?,00000000,00000002,00401D80,?,?,?,?,?,?,?,?), ref: 00404709
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004059B9
                                                              • _memset.LIBCMT ref: 004059CF
                                                                • Part of subcall function 0042F2AE: __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0042F2AE: ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                                • Part of subcall function 0042F2AE: ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                                • Part of subcall function 0042F2AE: HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                                • Part of subcall function 0042F2AE: GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$FileFreeHeapSizeUnothrow_t@std@@@___sbh_find_block___sbh_free_block__ehfuncinfo$??2@__lock_malloc_memset
                                                              • String ID: .\QHImageHlp.c
                                                              • API String ID: 2739003063-3639949391
                                                              • Opcode ID: 53e53731d5dc0c79f27a45eb467555df1d4b9eb4aa099394e6c9ad2dd20175f5
                                                              • Instruction ID: 517ecf2449ff4585e6a4ee02c056efbb873295a583b86914759d382ca83a3ea7
                                                              • Opcode Fuzzy Hash: 53e53731d5dc0c79f27a45eb467555df1d4b9eb4aa099394e6c9ad2dd20175f5
                                                              • Instruction Fuzzy Hash: 405181B1A047059FD310DF26D881A5BF7E4FB88314F44893EE98893341E779E919CB96
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00401BF9
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,?), ref: 00401C0D
                                                              • _malloc.LIBCMT ref: 00401C8F
                                                              • SetLastError.KERNEL32(00000008,?,?,?), ref: 00401CA3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_malloc$AllocHeap
                                                              • String ID: h#F
                                                              • API String ID: 2260188370-2559823950
                                                              • Opcode ID: 726705ae21d8206b44e732c66c3c47d14e3477e3fb47bf417179ed846ee2f9e3
                                                              • Instruction ID: 184c4f878ba588457f840cd7963ecda33a4738cc9467846cf079588f42e61e28
                                                              • Opcode Fuzzy Hash: 726705ae21d8206b44e732c66c3c47d14e3477e3fb47bf417179ed846ee2f9e3
                                                              • Instruction Fuzzy Hash: 1D4192B16043009FD310EF65D88176BB7E4AF84358F44093FF986A7291EA79E9098B57
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00408950: GetLastError.KERNEL32(?,?,?,00408AFA,?,?,00000000,?,00403DA0,00403DA0,.\QHImageHlp.c,000000F9,SetFilePointerEx(),?,00403F3C,00000000), ref: 00408953
                                                                • Part of subcall function 00408950: SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408960
                                                                • Part of subcall function 00408950: SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408999
                                                                • Part of subcall function 00408950: SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004089DA
                                                              • __CxxThrowException@8.LIBCMT ref: 00408A2C
                                                                • Part of subcall function 00430AEE: RaiseException.KERNEL32(?,?,?,00408A31,?,?,?,?,?,00408A31,004651D0,004651D0,?,?,00408AC0,F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h), ref: 00430B30
                                                              • __CxxThrowException@8.LIBCMT ref: 00408A64
                                                              • SetLastError.KERNEL32(00000008,BB40E64E,?,?,0046AFB0,0040BC07), ref: 00408A9D
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408AD0
                                                              Strings
                                                              • F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h, xrefs: 00408AAD
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$Exception@8Throw$ExceptionRaise
                                                              • String ID: F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h
                                                              • API String ID: 2285286292-3244885242
                                                              • Opcode ID: 81b26aa33b47442ad6151af77df4906e466fb63e331fc59c623991658bfe5acd
                                                              • Instruction ID: 78f608b893dcfaa12b1571cf0af7875c925312e8e6e0c0c1070cb4c6a42332e9
                                                              • Opcode Fuzzy Hash: 81b26aa33b47442ad6151af77df4906e466fb63e331fc59c623991658bfe5acd
                                                              • Instruction Fuzzy Hash: 612171B1908705BFC304EB55DD41F6BB7ECEB88704F50891EB559D2181E7B499048B76
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetFileSizeEx.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00002000), ref: 00405680
                                                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,?,00002000), ref: 004056DC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$PointerSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()$SetFilePointerEx()
                                                              • API String ID: 3549600656-2561355867
                                                              • Opcode ID: 002aeee8aa800f027f19e688b6a306bc8dd117ebe09191bab169b82a2e1697c7
                                                              • Instruction ID: 4410d8122ce1d505d7394927de24803af10f6d9e91fe08e3b22825f4f107851b
                                                              • Opcode Fuzzy Hash: 002aeee8aa800f027f19e688b6a306bc8dd117ebe09191bab169b82a2e1697c7
                                                              • Instruction Fuzzy Hash: 8521F5367003055BD710DE6AAC81B17B3D5EBC4756F54083FE948E3381EA7AE8099B69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 004037C0: GetFileSizeEx.KERNEL32(?,?), ref: 004037D1
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403B7D
                                                              • _memset.LIBCMT ref: 00403BC1
                                                              • SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000), ref: 00403BD8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$Size_memset
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 1683371807-3914906174
                                                              • Opcode ID: 5a486bb19bd36d66ff325cd2ee65ff1c875d8307be99d6bec348bddb0553e176
                                                              • Instruction ID: f0b076e3bf47f6dd10362d227eaba9b5b1ad37131829524ffb3952f504e23e11
                                                              • Opcode Fuzzy Hash: 5a486bb19bd36d66ff325cd2ee65ff1c875d8307be99d6bec348bddb0553e176
                                                              • Instruction Fuzzy Hash: C011D6727403016BD3209E7AAC45F2B7BDD9BC4B59F05483EB509E32C2E978F9058264
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0055B172
                                                              • wsprintfW.USER32 ref: 0055B1F3
                                                                • Part of subcall function 0055A636: SetEvent.KERNEL32(?,?,00000000,0055B20A,00000000), ref: 0055A662
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: EventLocalTimewsprintf
                                                              • String ID: [%04i/%02i/%02i %02i:%02i:%02i $Offline Keylogger Started$]
                                                              • API String ID: 1497725170-248792730
                                                              • Opcode ID: 9e1cc0fae71134d49d517e663f6512e620ae6c6363b0b445dd10374e47b6358a
                                                              • Instruction ID: 39aa3704526c6e0cc10b478df72604d45ee998af558d77cbf671bd35cebb5f7c
                                                              • Opcode Fuzzy Hash: 9e1cc0fae71134d49d517e663f6512e620ae6c6363b0b445dd10374e47b6358a
                                                              • Instruction Fuzzy Hash: 94114872504019A6C718BB64DC699FE7FBCBE98351B00011BF80656091FF746A49D6B8
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403A7F
                                                                • Part of subcall function 00403660: ReadFile.KERNEL32(?,?,?,O>@,00000000,?,00403E4F,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 0040366B
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 00403AA9
                                                                • Part of subcall function 004036C0: WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004036CB
                                                              • SetEndOfFile.KERNEL32(?), ref: 00403AE9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$Pointer$ReadWrite
                                                              • String ID: .\QHImageHlp.c$SetEndOfFile()
                                                              • API String ID: 2453416919-4247281097
                                                              • Opcode ID: e68519310e03d1bb457b939415d6ef20be6265009fbd0bc666f42bf69442ea78
                                                              • Instruction ID: 5d0f3968e9851f9b99018475ece1dc7d729d9a4bcc906fb307764f292e235d7a
                                                              • Opcode Fuzzy Hash: e68519310e03d1bb457b939415d6ef20be6265009fbd0bc666f42bf69442ea78
                                                              • Instruction Fuzzy Hash: 48114F317483006BD310DE61DC81F2B77E8BBC8B49F04493DF584E72D1E678EA018A5A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegisterClassExA.USER32(00000030), ref: 0056D55B
                                                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0056D576
                                                              • GetLastError.KERNEL32 ref: 0056D580
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ClassCreateErrorLastRegisterWindow
                                                              • String ID: 0$MsgWindowClass
                                                              • API String ID: 2877667751-2410386613
                                                              • Opcode ID: 406cce5398a2cee51def0a786bf17365c58c58645e20e25ddc99f390e0f75c62
                                                              • Instruction ID: 086d7df859b1770bbbbb5860280c405d0d486b29c7be6cf2c707041eae73b568
                                                              • Opcode Fuzzy Hash: 406cce5398a2cee51def0a786bf17365c58c58645e20e25ddc99f390e0f75c62
                                                              • Instruction Fuzzy Hash: D801E9B1D00229ABDB10DFD5DC849EFBBBCFA49354B40052AF911A6240E77159058BA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402EE9
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402F2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: 2bc59f0d90a408989745d97ca6cca8a47ae2d70541a7406858ea88eb858da6c3
                                                              • Instruction ID: 0d988d63105b4594c576dab5bfcb39c7112a556cb757edef9281528a5c4386ee
                                                              • Opcode Fuzzy Hash: 2bc59f0d90a408989745d97ca6cca8a47ae2d70541a7406858ea88eb858da6c3
                                                              • Instruction Fuzzy Hash: A1F04C727803117BE63866B47D49F8B2294AB84FA6F20063AF646F52C1EDF8D400529D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 0055779B
                                                              • CloseHandle.KERNEL32(?), ref: 005577AA
                                                              • CloseHandle.KERNEL32(?), ref: 005577AF
                                                              Strings
                                                              • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 00557791
                                                              • C:\Windows\System32\cmd.exe, xrefs: 00557796
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandle$CreateProcess
                                                              • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                              • API String ID: 2922976086-4183131282
                                                              • Opcode ID: f8a8e0bdac22176b619b85ba50e19ed0fb409a683c3b3f01be1770e623b86fa2
                                                              • Instruction ID: 66991e5577c50a840cc869574fa0bdfe4c9e38d3b8c7023ff9c1ec18eb327288
                                                              • Opcode Fuzzy Hash: f8a8e0bdac22176b619b85ba50e19ed0fb409a683c3b3f01be1770e623b86fa2
                                                              • Instruction Fuzzy Hash: 8FF01D76D402AD7ACF20AAD6DC4DEDF7F7DEBC6B11F00056ABA08A6140D6706404CAB1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 004026B4
                                                              • CloseHandle.KERNEL32(00000000), ref: 004026FF
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402709
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 5c2f589d72594a6186557a34d8f9ab2629b2f4204b1ce97046b22886ab6b4dfd
                                                              • Instruction ID: 5e1955fbec3b060e4e2a518d0272971e3ebcf4dc4b7bfd94ca19ef33900dbc19
                                                              • Opcode Fuzzy Hash: 5c2f589d72594a6186557a34d8f9ab2629b2f4204b1ce97046b22886ab6b4dfd
                                                              • Instruction Fuzzy Hash: D8F0E931794711BAEA7433747D8EF9B26855B80F14F100A36FD05B62C1FAFD9881815C
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402734
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040277F
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402789
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 0bf16aa2d3ef532428e59290cc4adf6f004b3245f62f8279228f85975612d61d
                                                              • Instruction ID: f9563fed443bc3ce27cc42163b1b5cd02e9fef1377e61b0ea9412f65184119cf
                                                              • Opcode Fuzzy Hash: 0bf16aa2d3ef532428e59290cc4adf6f004b3245f62f8279228f85975612d61d
                                                              • Instruction Fuzzy Hash: BEF02435B803117AEA302370BD8EF9B26859B80B14F100639FA05B62C1EAFC8841815D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00402883,?), ref: 004028C4
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402910
                                                              • CloseHandle.KERNEL32(00000000), ref: 0040291A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 3d46a497373ff0ad7eed8fa03e9e28bf72ad28d7d9b947b8055b5f28c65ecda9
                                                              • Instruction ID: 375de4f723d5be440e722e00ee92808fc970c294448244241056da5e2b769c1f
                                                              • Opcode Fuzzy Hash: 3d46a497373ff0ad7eed8fa03e9e28bf72ad28d7d9b947b8055b5f28c65ecda9
                                                              • Instruction Fuzzy Hash: F2F02435B80310BAEA202734BD4AB8B26856B80B25F104636F905B62C1E9F89842818D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402DD4
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402E20
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402E2A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: 466f3db981c29cd9ab0c083d27e948281e14ea849801040089524df0435ad0a5
                                                              • Instruction ID: d6c0eacc6a58afcf47488b7d74c908ad0bdafdd572413e70eb707a3f30383844
                                                              • Opcode Fuzzy Hash: 466f3db981c29cd9ab0c083d27e948281e14ea849801040089524df0435ad0a5
                                                              • Instruction Fuzzy Hash: CBF05031780310BBFA302334BD4EFC726855B80B25F110636F901B52C1F9FC9841818C
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00402E54
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402EA0
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402EAA
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseHandle$CreateFile
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 1378612225-1597445517
                                                              • Opcode ID: c3f94df5d2f6d5abf00dbf80a7ee594fe615d63b672bcb7178dd43aa0c17e214
                                                              • Instruction ID: ff91d42f4f04c0cb6f8a41b4dd40f6b58b4c815e4b6c7e4a66f809b21b469755
                                                              • Opcode Fuzzy Hash: c3f94df5d2f6d5abf00dbf80a7ee594fe615d63b672bcb7178dd43aa0c17e214
                                                              • Instruction Fuzzy Hash: 75F02435B803127BEA302374BD4AB8B26855B80B55F100636F905B62C2EAFC8841819D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: S\$C:\Users\user\Desktop\tu.exe
                                                              • API String ID: 0-1295420917
                                                              • Opcode ID: 7689a4ec7becda211271bb556b75848923144ba8ff1fbc306209c107a24be7f4
                                                              • Instruction ID: 3da44fa899a64a0d547f114c26073e4992e7279b7096bb97eadc5b21c31d9724
                                                              • Opcode Fuzzy Hash: 7689a4ec7becda211271bb556b75848923144ba8ff1fbc306209c107a24be7f4
                                                              • Instruction Fuzzy Hash: 03F09674614D659FCF0467A47D39B683E95FBA9783F400867FC03CA1A1EB644C4DD624
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040220A), ref: 00402244
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402286
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: 1db1b76687a4e8bb440efb1425c83ca015f779a6c3482fc86869fdcb9be7f4e9
                                                              • Instruction ID: ea553e56fd4a06c38728b9b31d26958a910725e45176fca1fa0d9a5223a05e07
                                                              • Opcode Fuzzy Hash: 1db1b76687a4e8bb440efb1425c83ca015f779a6c3482fc86869fdcb9be7f4e9
                                                              • Instruction Fuzzy Hash: AEF02735784320BBF63433707D4FF8F26855B80F24F100635FA01B51C1E8E8A881404C
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040221A), ref: 004022B4
                                                              • CloseHandle.KERNEL32(00000000), ref: 004022F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: efc07ab93a3e5379a1aafee87a645beb55a5777d45d23b4693688bb81b1a3ec9
                                                              • Instruction ID: 5d39d70a6adc7a977038086a062cd6ab7bed64c32d2e7ad64275184ee054e359
                                                              • Opcode Fuzzy Hash: efc07ab93a3e5379a1aafee87a645beb55a5777d45d23b4693688bb81b1a3ec9
                                                              • Instruction Fuzzy Hash: 23F02731B843117AE6343370BD4AF9B26855B80F54F100635FE01B91C1E8FC9841409D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,0040289A), ref: 00402944
                                                              • CloseHandle.KERNEL32(00000000), ref: 00402984
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CloseCreateFileHandle
                                                              • String ID: .\QHCheckCertificate.c$CreateFile()
                                                              • API String ID: 3498533004-1597445517
                                                              • Opcode ID: 23bdb758d88eb6772893afea764e0a844dda7450fbaae3f686122c8a370c2e8a
                                                              • Instruction ID: 0d69e81b708f15c77efef7e4f17722566965c308e96861222ce979ccf1989810
                                                              • Opcode Fuzzy Hash: 23bdb758d88eb6772893afea764e0a844dda7450fbaae3f686122c8a370c2e8a
                                                              • Instruction Fuzzy Hash: 73F05C71B803117BF63063B07D0EF8B2585A740B25F110235FE41F51C1E8E8584181AD
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005932EB,?,?,0059328B,?), ref: 0059335A
                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0059336D
                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,005932EB,?,?,0059328B,?), ref: 00593390
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                              • String ID: CorExitProcess$mscoree.dll
                                                              • API String ID: 4061214504-1276376045
                                                              • Opcode ID: 54862582b64c07b9a2d7f3c08a0888364795bb448104f05ce2a944a495fa0964
                                                              • Instruction ID: 4483612b1ce96fe60924071afb78409a10d3cdc0dcc2c103b021761816c41c77
                                                              • Opcode Fuzzy Hash: 54862582b64c07b9a2d7f3c08a0888364795bb448104f05ce2a944a495fa0964
                                                              • Instruction Fuzzy Hash: A8F04F34A41219FBCF11AFA4EC49BADBFB4FF45752F0041A9F805A2260DB749E44DB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00555120
                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00554E7A,00000001), ref: 0055512C
                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00554E7A,00000001), ref: 00555137
                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00554E7A,00000001), ref: 00555140
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                              • String ID: KeepAlive | Disabled
                                                              • API String ID: 2993684571-305739064
                                                              • Opcode ID: 0bf274f8949dcffd3d4c2fbf4ec098b669adeee0d06b8d35bc6860dbee0bcfc2
                                                              • Instruction ID: 2841e4717c7851962fd72042cbc9f2f0693ddb96937d7e91bd08d54d09158242
                                                              • Opcode Fuzzy Hash: 0bf274f8949dcffd3d4c2fbf4ec098b669adeee0d06b8d35bc6860dbee0bcfc2
                                                              • Instruction Fuzzy Hash: 1DF02475804711BFEB213B748C1EB6A7E98BF13312F00080EFCC2826A1D9614808DB52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __getptd.LIBCMT ref: 0043AB1F
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __getptd.LIBCMT ref: 0043AB30
                                                              • __getptd.LIBCMT ref: 0043AB3E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __getptd$__amsg_exit__getptd_noexit
                                                              • String ID: MOC$csm
                                                              • API String ID: 803148776-1389381023
                                                              • Opcode ID: 546a182a6e7d5b12224b1f81106d24650c5b7328c0601bff92d7242a378783a5
                                                              • Instruction ID: 05e78cd1568f14788fbbe09d30b4e391dea899aa562c3f9198f8c26ae00602dc
                                                              • Opcode Fuzzy Hash: 546a182a6e7d5b12224b1f81106d24650c5b7328c0601bff92d7242a378783a5
                                                              • Instruction Fuzzy Hash: E9E04F71110204CFC720AB65C047B297395FB4D318F2620ABEA8DC7322C77CF850954B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00551414
                                                              • GetProcAddress.KERNEL32(00000000), ref: 0055141B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: GetCursorInfo$User32.dll$`#v
                                                              • API String ID: 1646373207-1032071883
                                                              • Opcode ID: baf76192c9bb759ac01362edc647f33f4bdfb054bdab9bacc145317017d73603
                                                              • Instruction ID: e90bcedeef89d52fe8bc9f2ec7930fd227ec85d381db6dd45e5ef3b1a360cdbb
                                                              • Opcode Fuzzy Hash: baf76192c9bb759ac01362edc647f33f4bdfb054bdab9bacc145317017d73603
                                                              • Instruction Fuzzy Hash: 00B092B8582A20ABCB005BF4AC0EE853EA4FAB57023000059B40291160DBB02048EA28
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 98c75021fd5035f935ea661cd5ea1e057e24b24be03cfadd74577296c2c080cc
                                                              • Instruction ID: aea2287324febd86e342084a61e4f505d859bd9c4e152427947f0b33a53ac204
                                                              • Opcode Fuzzy Hash: 98c75021fd5035f935ea661cd5ea1e057e24b24be03cfadd74577296c2c080cc
                                                              • Instruction Fuzzy Hash: 8571B235901A379BCF218F95C884ABEBFB9FF95360F160629E41267281DB708D41CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00596137: RtlAllocateHeap.NTDLL(00000000,0058529C,?,?,00588847,?,?,00000000,?,?,0055DE62,0058529C,?,?,?,?), ref: 00596169
                                                              • _free.LIBCMT ref: 00594E06
                                                              • _free.LIBCMT ref: 00594E1D
                                                              • _free.LIBCMT ref: 00594E3C
                                                              • _free.LIBCMT ref: 00594E57
                                                              • _free.LIBCMT ref: 00594E6E
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$AllocateHeap
                                                              • String ID:
                                                              • API String ID: 3033488037-0
                                                              • Opcode ID: 1daf295fcfd0403364a099682d484f6cc4d0f87ba8337f556071e90f38940cf5
                                                              • Instruction ID: 87f704412bad8e863b139f4e1779a51d50c59ad01605619fe8ab37ffa4906cb6
                                                              • Opcode Fuzzy Hash: 1daf295fcfd0403364a099682d484f6cc4d0f87ba8337f556071e90f38940cf5
                                                              • Instruction Fuzzy Hash: CB51BE72A00705AFDF21DF69C881E6A7BF8FF49724B144669E819D7250E735AE02CF80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,005AF234), ref: 005993CF
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,005C2764,000000FF,00000000,0000003F,00000000,?,?), ref: 00599447
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,005C27B8,000000FF,?,0000003F,00000000,?), ref: 00599474
                                                              • _free.LIBCMT ref: 005993BD
                                                                • Part of subcall function 00596782: RtlFreeHeap.NTDLL(00000000,00000000,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?), ref: 00596798
                                                                • Part of subcall function 00596782: GetLastError.KERNEL32(?,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?,?), ref: 005967AA
                                                              • _free.LIBCMT ref: 00599589
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                              • String ID:
                                                              • API String ID: 1286116820-0
                                                              • Opcode ID: 12352806e19cea900e6de51d0b50fdf3aa03bd0db44f28ed5448d492579886b1
                                                              • Instruction ID: 219bef0ce3c03885086aca1110f7874c2d885f33b7aab27a87fd07464ed6876f
                                                              • Opcode Fuzzy Hash: 12352806e19cea900e6de51d0b50fdf3aa03bd0db44f28ed5448d492579886b1
                                                              • Instruction Fuzzy Hash: 6E51E57190021AAFCF11EFA99C85DAEBFBCFF95310B10066EE41497191EB308E459B50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0056BFB7: GetCurrentProcess.KERNEL32(?,?,?,0055DAAA,WinDir,00000000,00000000), ref: 0056BFC8
                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0055F91B
                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0055F93F
                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0055F94E
                                                              • CloseHandle.KERNEL32(00000000), ref: 0055FB05
                                                                • Part of subcall function 0056BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0055F5F9,00000000,?,?,005C5338), ref: 0056BFFA
                                                                • Part of subcall function 0056C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0056C1F5
                                                                • Part of subcall function 0056C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0056C208
                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0055FAF6
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                              • String ID:
                                                              • API String ID: 4269425633-0
                                                              • Opcode ID: a92bed001775c7457ad66e46f831beb08ef9bd9cc30857e2f05f83585a3d698c
                                                              • Instruction ID: e2a2e57cc93d7ed7c6309b400eef6c5db7ef3ec20994f96b8f656ba121b4ea1a
                                                              • Opcode Fuzzy Hash: a92bed001775c7457ad66e46f831beb08ef9bd9cc30857e2f05f83585a3d698c
                                                              • Instruction Fuzzy Hash: E14112311086465BC324E721DC6ABEFBBA9BFD4341F50492EF88A83191EF30594DC766
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,?,?,00408EFA,?,?,00000001,?,004036B0), ref: 004087F1
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000), ref: 0040880F
                                                              • _wcsrchr.LIBCMT ref: 00408880
                                                              • _vswprintf_s.LIBCMT ref: 004088DD
                                                              • GetSystemTime.KERNEL32(00000288), ref: 00408916
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$SystemTime__getptd_noexit_vswprintf_s_wcsrchr
                                                              • String ID:
                                                              • API String ID: 3942181620-0
                                                              • Opcode ID: 3be596fcb2dc188245080ee248d0068dd7f63012560903d31e54436db08ccaf5
                                                              • Instruction ID: a12dfbe8bcb0b0c09f6ff4f14e91d9b616d30136fea910be67afa850a14d1e9c
                                                              • Opcode Fuzzy Hash: 3be596fcb2dc188245080ee248d0068dd7f63012560903d31e54436db08ccaf5
                                                              • Instruction Fuzzy Hash: 1A414C719147018FC720AF75C845667B3E4EF58310F04892EE59AD73A1EB78A804CB6A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0057DD01,?,?,?,00000001,00000000,?,00000001,0057DD01,0057DD01), ref: 005A1179
                                                              • __alloca_probe_16.LIBCMT ref: 005A11B1
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0057DD01,?,?,?,00000001,00000000,?,00000001,0057DD01,0057DD01,?), ref: 005A1202
                                                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0057DD01,0057DD01,?,00000002,00000000), ref: 005A1214
                                                              • __freea.LIBCMT ref: 005A121D
                                                                • Part of subcall function 00596137: RtlAllocateHeap.NTDLL(00000000,0058529C,?,?,00588847,?,?,00000000,?,?,0055DE62,0058529C,?,?,?,?), ref: 00596169
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                              • String ID:
                                                              • API String ID: 313313983-0
                                                              • Opcode ID: b2ab026d7c4794194375f40632af7ed5a3f14aa1d089a135a348e27d244bc233
                                                              • Instruction ID: 18e2d84c631cc4eae661f73d8bc46ff88af6da52389372134cf790b54718a7d0
                                                              • Opcode Fuzzy Hash: b2ab026d7c4794194375f40632af7ed5a3f14aa1d089a135a348e27d244bc233
                                                              • Instruction Fuzzy Hash: 8C31DA76A0061AABDF249FA5CC45EAE7FA5FF82310F040168FC04DA291E735CD91CBA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32 ref: 0059F363
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0059F386
                                                                • Part of subcall function 00596137: RtlAllocateHeap.NTDLL(00000000,0058529C,?,?,00588847,?,?,00000000,?,?,0055DE62,0058529C,?,?,?,?), ref: 00596169
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0059F3AC
                                                              • _free.LIBCMT ref: 0059F3BF
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0059F3CE
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                              • String ID:
                                                              • API String ID: 336800556-0
                                                              • Opcode ID: 3ddf21385187281f66a9b0b4b5f7cca11722972da94c51e505eba8ac7d1294b0
                                                              • Instruction ID: ef24125c5720e5b648b2b5efbb76110ba433770c5a01fd3b7fd890e6d8edb32d
                                                              • Opcode Fuzzy Hash: 3ddf21385187281f66a9b0b4b5f7cca11722972da94c51e505eba8ac7d1294b0
                                                              • Instruction Fuzzy Hash: 190144736016257F2B211ABA5C8CCBF7E6DEAC7BA5325093AFD14C6241DA688D0592B0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _memset.LIBCMT ref: 0042D680
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000102), ref: 0042D696
                                                              • PathRemoveFileSpecW.SHLWAPI(?), ref: 0042D6A3
                                                              • _memset.LIBCMT ref: 0042D6FE
                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,?,00000000,?), ref: 0042D713
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FilePath_memset$FolderModuleNameRemoveSpecSpecial
                                                              • String ID:
                                                              • API String ID: 359805494-0
                                                              • Opcode ID: 7ffac12201360a27492ef9a8c6e46d6ba8d65e8f74295bea7cd19c9cd888329f
                                                              • Instruction ID: d0c4d087bca0709b8c827d22c595415c302136f733cf5c869673d8418bc65854
                                                              • Opcode Fuzzy Hash: 7ffac12201360a27492ef9a8c6e46d6ba8d65e8f74295bea7cd19c9cd888329f
                                                              • Instruction Fuzzy Hash: 0821927190121C9FD754EBA4DC42FE97375AF88708F4000EDA609A7182EE759A988F69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __lock.LIBCMT ref: 00436C41
                                                                • Part of subcall function 0043385A: __mtinitlocknum.LIBCMT ref: 00433870
                                                                • Part of subcall function 0043385A: __amsg_exit.LIBCMT ref: 0043387C
                                                                • Part of subcall function 0043385A: EnterCriticalSection.KERNEL32(?,?,?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001), ref: 00433884
                                                              • InterlockedDecrement.KERNEL32(00000000), ref: 00436C53
                                                                • Part of subcall function 0042F2AE: __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0042F2AE: ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                                • Part of subcall function 0042F2AE: ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                                • Part of subcall function 0042F2AE: HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                                • Part of subcall function 0042F2AE: GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              • __lock.LIBCMT ref: 00436C81
                                                              • ___removelocaleref.LIBCMT ref: 00436C90
                                                              • ___freetlocinfo.LIBCMT ref: 00436CA9
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __lock$CriticalDecrementEnterErrorFreeHeapInterlockedLastSection___freetlocinfo___removelocaleref___sbh_find_block___sbh_free_block__amsg_exit__mtinitlocknum
                                                              • String ID:
                                                              • API String ID: 1907232653-0
                                                              • Opcode ID: dddfa3f3178d8383d32f9b27f59e0bf06b1583cf40736a92abf47a8fd31915da
                                                              • Instruction ID: ec597f54dc5de8ed20ed2a1f663af052850153511863fb80e7f62ebd8217dee4
                                                              • Opcode Fuzzy Hash: dddfa3f3178d8383d32f9b27f59e0bf06b1583cf40736a92abf47a8fd31915da
                                                              • Instruction Fuzzy Hash: B1119131501306BADB246FA6D64575E77A4EF08725F26B46FF4D4972C1DE3CC880861D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 0043F1C4
                                                              • GetCurrentProcessId.KERNEL32 ref: 0043F1D0
                                                              • GetCurrentThreadId.KERNEL32 ref: 0043F1D8
                                                              • GetTickCount.KERNEL32 ref: 0043F1E0
                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 0043F1EC
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                              • String ID:
                                                              • API String ID: 1445889803-0
                                                              • Opcode ID: d0d8306bcb5e26c02142090d8190e6228b7ca3820eab039a88585cbb8b5a3025
                                                              • Instruction ID: 7a47d9cedc6821939cea3c025b9ead3d05f34fa2e758b9e5b5024ba19f434d7b
                                                              • Opcode Fuzzy Hash: d0d8306bcb5e26c02142090d8190e6228b7ca3820eab039a88585cbb8b5a3025
                                                              • Instruction Fuzzy Hash: DA11A076D00324DFCB109BF4E88865BB7E8AB0C755F5209B2E811E7111EA749E008B99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(?,00000000,00000000,0058BC87,00000000,00000000,?,0058BD0B,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0059829E
                                                              • _free.LIBCMT ref: 005982D3
                                                              • _free.LIBCMT ref: 005982FA
                                                              • SetLastError.KERNEL32(00000000,?,00555103), ref: 00598307
                                                              • SetLastError.KERNEL32(00000000,?,00555103), ref: 00598310
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLast$_free
                                                              • String ID:
                                                              • API String ID: 3170660625-0
                                                              • Opcode ID: 4f06469ca68e04c12506171678416b98e851dcb7d71711df0d8949c542ebbe49
                                                              • Instruction ID: 3d3170a43b1013da1590e6082bbac7410bce6f71b270b2c9a77784f54fae8c75
                                                              • Opcode Fuzzy Hash: 4f06469ca68e04c12506171678416b98e851dcb7d71711df0d8949c542ebbe49
                                                              • Instruction Fuzzy Hash: C001D13E100F012A8E1267646C8DE7B2D1EFBD37B57240928F81596192EF688C09A164
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __getptd.LIBCMT ref: 00436325
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __amsg_exit.LIBCMT ref: 00436345
                                                              • __lock.LIBCMT ref: 00436355
                                                              • InterlockedDecrement.KERNEL32(?), ref: 00436372
                                                              • InterlockedIncrement.KERNEL32(00467FD8), ref: 0043639D
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                              • String ID:
                                                              • API String ID: 4271482742-0
                                                              • Opcode ID: 1c3ee6bdb297f0c583020a54c75024eb37d5180de5e8673e1c7c4d2d8cd9b9a2
                                                              • Instruction ID: 2120e401ec039c9d3c469062b26075b44e78161f10bd3444f52201ecc5acd4ca
                                                              • Opcode Fuzzy Hash: 1c3ee6bdb297f0c583020a54c75024eb37d5180de5e8673e1c7c4d2d8cd9b9a2
                                                              • Instruction Fuzzy Hash: 7401A131900713EBDB11AF66944574E7760BB08714F16912FEC14A3282DB7CA9428BDE
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __lock.LIBCMT ref: 0042F2CC
                                                                • Part of subcall function 0043385A: __mtinitlocknum.LIBCMT ref: 00433870
                                                                • Part of subcall function 0043385A: __amsg_exit.LIBCMT ref: 0043387C
                                                                • Part of subcall function 0043385A: EnterCriticalSection.KERNEL32(?,?,?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001), ref: 00433884
                                                              • ___sbh_find_block.LIBCMT ref: 0042F2D7
                                                              • ___sbh_free_block.LIBCMT ref: 0042F2E6
                                                              • HeapFree.KERNEL32(00000000,?,00464668,0000000C,0043383B,00000000,004648F0,0000000C,00433875,?,?,?,004479C3,00000004,00464E28,0000000C), ref: 0042F316
                                                              • GetLastError.KERNEL32(?,004479C3,00000004,00464E28,0000000C,004356E9,?,?,00000000,00000000,00000000,?,004352B5,00000001,00000214), ref: 0042F327
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                              • String ID:
                                                              • API String ID: 2714421763-0
                                                              • Opcode ID: be5a6cb1eb5df8936d36834704c5a715c9b684255bafcbe413cb2a9fed154717
                                                              • Instruction ID: b01b193fb1bad3170891ec4c80f6ca9d339300dd53edf7a7ab97a6ea33272983
                                                              • Opcode Fuzzy Hash: be5a6cb1eb5df8936d36834704c5a715c9b684255bafcbe413cb2a9fed154717
                                                              • Instruction Fuzzy Hash: B601AC31A01315EADB20AFB1AD05B5E7AB49F05765FD0007FF804951D1DB7C85458E9D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _free.LIBCMT ref: 005A09D4
                                                                • Part of subcall function 00596782: RtlFreeHeap.NTDLL(00000000,00000000,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?), ref: 00596798
                                                                • Part of subcall function 00596782: GetLastError.KERNEL32(?,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?,?), ref: 005967AA
                                                              • _free.LIBCMT ref: 005A09E6
                                                              • _free.LIBCMT ref: 005A09F8
                                                              • _free.LIBCMT ref: 005A0A0A
                                                              • _free.LIBCMT ref: 005A0A1C
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: a5a6b067f3043cce0f4fa8d4186cdcd73bda14aa7a63387858db4c630bdf31a7
                                                              • Instruction ID: 930b962f9c6ebe7fd1ea7dcfc4de3d846e133f7acf6fbbe9637305d09d354677
                                                              • Opcode Fuzzy Hash: a5a6b067f3043cce0f4fa8d4186cdcd73bda14aa7a63387858db4c630bdf31a7
                                                              • Instruction Fuzzy Hash: A6F0F632010A00BFCA20EB9CF8C6C1E3BDDFA423157589905F029D3543CB38FC8496A4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _free.LIBCMT ref: 00594066
                                                                • Part of subcall function 00596782: RtlFreeHeap.NTDLL(00000000,00000000,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?), ref: 00596798
                                                                • Part of subcall function 00596782: GetLastError.KERNEL32(?,?,005A0C6F,?,00000000,?,00000000,?,005A0F13,?,00000007,?,?,005A145E,?,?), ref: 005967AA
                                                              • _free.LIBCMT ref: 00594078
                                                              • _free.LIBCMT ref: 0059408B
                                                              • _free.LIBCMT ref: 0059409C
                                                              • _free.LIBCMT ref: 005940AD
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$ErrorFreeHeapLast
                                                              • String ID:
                                                              • API String ID: 776569668-0
                                                              • Opcode ID: c9311afa16c645f6a826b797c93ba964811bdccbc96401403d78083cee2b73a7
                                                              • Instruction ID: a44a6ab28766ad34ec427b6fbd4381cc9211fdc2de71de2ba0489ff490fb45b0
                                                              • Opcode Fuzzy Hash: c9311afa16c645f6a826b797c93ba964811bdccbc96401403d78083cee2b73a7
                                                              • Instruction Fuzzy Hash: C9F0BE72801E209FCA21AF68BC89C053F61F725725784420AF02466671C7B89E4EFFC6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,00000000,?,00000CCC,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00403D80
                                                                • Part of subcall function 00403660: ReadFile.KERNEL32(?,?,?,O>@,00000000,?,00403E4F,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 0040366B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File$PointerRead
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 3154509469-3914906174
                                                              • Opcode ID: 5d98508b3de8acd582bae8ac88a94eb38bcbdce3d783b9f31bc7296ee13450e1
                                                              • Instruction ID: a623d500c4186b7208de29a6288d575388abf472c41b592f863d29a671c00f12
                                                              • Opcode Fuzzy Hash: 5d98508b3de8acd582bae8ac88a94eb38bcbdce3d783b9f31bc7296ee13450e1
                                                              • Instruction Fuzzy Hash: 04717D71A04701AFD314DF29D881A5AB7E9FB88315F444A3EF848E3780E738E9548BD6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _strpbrk.LIBCMT ref: 0059E738
                                                              • _free.LIBCMT ref: 0059E855
                                                                • Part of subcall function 0058BD19: IsProcessorFeaturePresent.KERNEL32(00000017,0058BCEB,00555103,?,00000000,00000000,005520A6,00000000,00000000,?,0058BD0B,00000000,00000000,00000000,00000000,00000000), ref: 0058BD1B
                                                                • Part of subcall function 0058BD19: GetCurrentProcess.KERNEL32(C0000417,?,00555103), ref: 0058BD3D
                                                                • Part of subcall function 0058BD19: TerminateProcess.KERNEL32(00000000,?,00555103), ref: 0058BD44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                              • String ID: *?$.
                                                              • API String ID: 2812119850-3972193922
                                                              • Opcode ID: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                              • Instruction ID: 2475401379c27503c05eed2aa92d9d8a2396e30609e7d9c8e463aeaff84ca9d8
                                                              • Opcode Fuzzy Hash: 6703a85dd49711e1afab558f77f60869b6155e4f96c4351f2947c71862cae23b
                                                              • Instruction Fuzzy Hash: 26519175E0020AAFDF14DFA8C886AADBFB5FF98314F244169E854E7341EB319E018B50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005924DE
                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005924F3
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                              • String ID: `#Y$`#Y
                                                              • API String ID: 885266447-1769481409
                                                              • Opcode ID: c45c2ccb37e70a9e09080734f4a7968359ee650ff68b623af33ced09871762d0
                                                              • Instruction ID: d10f614519fdac59f3cafe7286de8f8e5c3b21e78938e1c8d120cea002f36324
                                                              • Opcode Fuzzy Hash: c45c2ccb37e70a9e09080734f4a7968359ee650ff68b623af33ced09871762d0
                                                              • Instruction Fuzzy Hash: 25516971A00209AFCF18DF58C884AADBFB2FB98324F19C199E8189B361D7719D51CB80
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 004050DC
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,?,00402A5E,?,00002000), ref: 004050EE
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AllocErrorHeapLast_malloc
                                                              • String ID: .\QHImageHlp.c$Certificate Table
                                                              • API String ID: 485325758-1472710443
                                                              • Opcode ID: 349a017d88896a46223a65075aa5d5ea743bd96e5839130b69b8610103239546
                                                              • Instruction ID: a446fb7a9fde2d7275c523b3a5589ebdd4a490cd7bb37a51f9c1ccee7326068c
                                                              • Opcode Fuzzy Hash: 349a017d88896a46223a65075aa5d5ea743bd96e5839130b69b8610103239546
                                                              • Instruction Fuzzy Hash: D4410575741B005BE320EB25EC41B97B3E0FF80711F04497FE989923C1E6B9A5088B9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00404EFC
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,00000003,004023AF,00000000), ref: 00404F0E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AllocErrorHeapLast_malloc
                                                              • String ID: .\QHImageHlp.c$Certificate Table
                                                              • API String ID: 485325758-1472710443
                                                              • Opcode ID: 62d59e5dec82c27ee1c675ce2e38e0508c742f546705f42b660697afc313c552
                                                              • Instruction ID: 56f707983adcd4c1712f8bbe2d9e1cbd60e6c7eff53ffe87e7f68e14888cd6f6
                                                              • Opcode Fuzzy Hash: 62d59e5dec82c27ee1c675ce2e38e0508c742f546705f42b660697afc313c552
                                                              • Instruction Fuzzy Hash: 4041D5B1741B015BE320DF25EC41F97B3E0EF80715F14893FE989923C1E6B9A5498B9A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\tu.exe,00000104), ref: 00593475
                                                              • _free.LIBCMT ref: 00593540
                                                              • _free.LIBCMT ref: 0059354A
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _free$FileModuleName
                                                              • String ID: C:\Users\user\Desktop\tu.exe
                                                              • API String ID: 2506810119-1793143716
                                                              • Opcode ID: 084b2eaec1d15fc67494d4c39baaabfb6bbdad8a02972c5781d9a3f6a13edcec
                                                              • Instruction ID: 9df2f9c03eb0356270eb258e33efbce7d84da3e7c91f381beba4b63280310620
                                                              • Opcode Fuzzy Hash: 084b2eaec1d15fc67494d4c39baaabfb6bbdad8a02972c5781d9a3f6a13edcec
                                                              • Instruction Fuzzy Hash: A4317C71A00258EFDF22DB99DC89D9EBFACFB89710F114066F80497211D6B09F45DB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 0040155C
                                                              • SetLastError.KERNEL32(00000008,?,?,?,00401C5E,?,?), ref: 0040156C
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_malloc
                                                              • String ID: .\QHCheckCertificate.c$:ghVI
                                                              • API String ID: 1018170914-279542517
                                                              • Opcode ID: e398552c40245c4c81058395fa59cc72440da4dc1ea5e3436f6df70d9f0a9f0b
                                                              • Instruction ID: f102504e1e88be22b862c4b36d41646d64cb99423fcae649bfb1a7f27528034d
                                                              • Opcode Fuzzy Hash: e398552c40245c4c81058395fa59cc72440da4dc1ea5e3436f6df70d9f0a9f0b
                                                              • Instruction Fuzzy Hash: E021A5F5701A117FD704EB59FD82A467390EB84319B10803BF909A7391F7F998258B9B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00554066
                                                                • Part of subcall function 0056B978: GetCurrentProcessId.KERNEL32(00000000,76233530,00000000,?,?,?,?,005B6468,0055D20D,.vbs,?,?,?,?,?,005C52F0), ref: 0056B99F
                                                                • Part of subcall function 00568568: CloseHandle.KERNEL32(005540F5,?,?,005540F5,005B5E74), ref: 0056857E
                                                                • Part of subcall function 00568568: CloseHandle.KERNEL32(t^[,?,?,005540F5,005B5E74), ref: 00568587
                                                                • Part of subcall function 0056C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0055A843), ref: 0056C49E
                                                              • Sleep.KERNEL32(000000FA,005B5E74), ref: 00554138
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                              • String ID: /sort "Visit Time" /stext "$0N\
                                                              • API String ID: 368326130-898489816
                                                              • Opcode ID: cc93dbb78251c965438b3ebfbeb8415c15537333fc0482795fd30641fb8c6fb6
                                                              • Instruction ID: 1dbf4ddbe00e1e3813f97e1ce259f529f40d7ab2440626264f55f7e71e886b65
                                                              • Opcode Fuzzy Hash: cc93dbb78251c965438b3ebfbeb8415c15537333fc0482795fd30641fb8c6fb6
                                                              • Instruction Fuzzy Hash: D131223191051A5BCB18F6B4D8AAAED7F79BFD1302F40006AF90697191EF205D8DCAA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _wcslen.LIBCMT ref: 005662F5
                                                                • Part of subcall function 00563877: RegCreateKeyA.ADVAPI32(80000001,00000000,005B60A4), ref: 00563885
                                                                • Part of subcall function 00563877: RegSetValueExA.KERNEL32(005B60A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0055C152,005B6C48,00000001,000000AF,005B60A4), ref: 005638A0
                                                                • Part of subcall function 00563877: RegCloseKey.ADVAPI32(005B60A4,?,?,?,0055C152,005B6C48,00000001,000000AF,005B60A4), ref: 005638AB
                                                                • Part of subcall function 00559DE4: _wcslen.LIBCMT ref: 00559DFD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: _wcslen$CloseCreateValue
                                                              • String ID: !DU$okmode$P\
                                                              • API String ID: 3411444782-2694033837
                                                              • Opcode ID: 7ee0cb8003c66fa5ac8bf06562c261c13ab6f3abe5bbfd9536a9385ae6d11eae
                                                              • Instruction ID: 31cd3fb922e4973f51b6fa1788c3ea9acb8c4e92a395d7542b789897d0c9db56
                                                              • Opcode Fuzzy Hash: 7ee0cb8003c66fa5ac8bf06562c261c13ab6f3abe5bbfd9536a9385ae6d11eae
                                                              • Instruction Fuzzy Hash: 5111C3317449021EDA1877B0A87FB7D2E9ABFD0311F44082FBD428B6D2EF6458499325
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0055C4C3: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0055C4F6
                                                              • PathFileExistsW.SHLWAPI(00000000), ref: 0055C61D
                                                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0055C688
                                                              Strings
                                                              • User Data\Profile ?\Network\Cookies, xrefs: 0055C635
                                                              • User Data\Default\Network\Cookies, xrefs: 0055C603
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExistsFilePath
                                                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                              • API String ID: 1174141254-1980882731
                                                              • Opcode ID: db180ea14324cc3b224616fdd8f152eff650c3adaf50409e832cfd336e2f9d4a
                                                              • Instruction ID: 87c69604b3d5a1dc1783538f9f3978af7a12b5fbd0c36137063076caa0a7df35
                                                              • Opcode Fuzzy Hash: db180ea14324cc3b224616fdd8f152eff650c3adaf50409e832cfd336e2f9d4a
                                                              • Instruction Fuzzy Hash: E321E57190061A9ACB04F7B5DC7ADEEBF78FE90712F400417F90693195EF206A4EC6A4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0055C526: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0055C559
                                                              • PathFileExistsW.SHLWAPI(00000000), ref: 0055C6EC
                                                              • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0055C757
                                                              Strings
                                                              • User Data\Profile ?\Network\Cookies, xrefs: 0055C704
                                                              • User Data\Default\Network\Cookies, xrefs: 0055C6D2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExistsFilePath
                                                              • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                              • API String ID: 1174141254-1980882731
                                                              • Opcode ID: 6b5de0c16035eb5fee2f7137ced6678b063151531d01d3a2e7e8d8372bb3ccb7
                                                              • Instruction ID: d5b6fc6eee726224c0a33a674d57bf84e050768251331a8c0e599268a4430e0e
                                                              • Opcode Fuzzy Hash: 6b5de0c16035eb5fee2f7137ced6678b063151531d01d3a2e7e8d8372bb3ccb7
                                                              • Instruction Fuzzy Hash: F221D67191011A5ACB04F7B1DC6ADEEBF78FE94712B40041BF90293191EF20694ECA94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetProcAddress.KERNEL32(000013CC,CreateObject), ref: 0040C3F2
                                                              • FreeLibrary.KERNEL32(000013CC,?,0040C18C), ref: 0040C408
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AddressFreeLibraryProc
                                                              • String ID: CreateObject
                                                              • API String ID: 3013587201-166191583
                                                              • Opcode ID: d6bd99be3fb84f35f21d06f6efc7538b6342fd60ee3495d6ffe4e42ac6a0d53d
                                                              • Instruction ID: 5dfa618b8ef0119369d955ab7243a8de27af72229873d7ba0b9cf45c338c119e
                                                              • Opcode Fuzzy Hash: d6bd99be3fb84f35f21d06f6efc7538b6342fd60ee3495d6ffe4e42ac6a0d53d
                                                              • Instruction Fuzzy Hash: FA21EA74A00308EFCB00DF94D5D4A6DBBB5BF49315F2082A9E905AB392C735EA81DB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00556A82
                                                              • GetProcAddress.KERNEL32(00000000), ref: 00556A89
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: CryptUnprotectData$crypt32
                                                              • API String ID: 2574300362-2380590389
                                                              • Opcode ID: ef34a67cc75fc31d68559deddc6c8f686a8b090f1380b4874a8991af3c623d7e
                                                              • Instruction ID: 951abdba5ef7ec09ab61e443a7de95c4d8e5efc2da1821a0fdd379cbf9eb949c
                                                              • Opcode Fuzzy Hash: ef34a67cc75fc31d68559deddc6c8f686a8b090f1380b4874a8991af3c623d7e
                                                              • Instruction Fuzzy Hash: 2401B535A04256AFCB18DFADDC549AEBFB8FF55301F04416EED55E3240D67099088790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32 ref: 00408B28
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(00000000), ref: 00408B46
                                                              • __snwprintf.LIBCMT ref: 00408B95
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$__getptd_noexit__snwprintf
                                                              • String ID: %s(%s:%d)
                                                              • API String ID: 2604959178-4223833681
                                                              • Opcode ID: 4c5ff8d7da7caec13398d7179f177572afe30be613d32b51b72e43316ceb08cc
                                                              • Instruction ID: c67e5680cbfc749e9507c7cc80fc2d4b5564d9924784b961a3afd699cde5ee08
                                                              • Opcode Fuzzy Hash: 4c5ff8d7da7caec13398d7179f177572afe30be613d32b51b72e43316ceb08cc
                                                              • Instruction Fuzzy Hash: 6801B972600704AFC720AFA5ED44AA773E8EF45751F00443FF94997351DBB8AC018799
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _swscanf.LIBCMT ref: 004035FD
                                                                • Part of subcall function 004324AF: _vscan_fn.LIBCMT ref: 004324C6
                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,004018B8,00000000,00000000), ref: 0040361F
                                                              • LocalFileTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,004018B8,00000000,00000000), ref: 00403632
                                                              Strings
                                                              • %hu-%hu-%hu %hu:%hu:%hu, xrefs: 004035F7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Time$File$LocalSystem_swscanf_vscan_fn
                                                              • String ID: %hu-%hu-%hu %hu:%hu:%hu
                                                              • API String ID: 3712118799-1004895946
                                                              • Opcode ID: 4751721bb5c0777da57fecde43eb29ccf8ba50de587755977e36d3932f733de8
                                                              • Instruction ID: 4c245d33534f4f5b71e5f77063661e55d37b6d60919a2df9bc087bf9af5aa4ff
                                                              • Opcode Fuzzy Hash: 4751721bb5c0777da57fecde43eb29ccf8ba50de587755977e36d3932f733de8
                                                              • Instruction Fuzzy Hash: 171100B2504301AFC365DFA5C980D9BB7E8ABDC701F044E2EF199D2250F675D648CB52
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00555159), ref: 00555173
                                                              • CloseHandle.KERNEL32(?), ref: 005551CA
                                                              • SetEvent.KERNEL32(?), ref: 005551D9
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseEventHandleObjectSingleWait
                                                              • String ID: Connection Timeout
                                                              • API String ID: 2055531096-499159329
                                                              • Opcode ID: 774833371271baf623cb53f7cf3013424089c3179c476bfd002ceb6560da2e55
                                                              • Instruction ID: 359004c61d1b797c0d48f2e06aafe3e7cab900d43bde6afdac91c5a067cc6fa3
                                                              • Opcode Fuzzy Hash: 774833371271baf623cb53f7cf3013424089c3179c476bfd002ceb6560da2e55
                                                              • Instruction Fuzzy Hash: 8F012835501F01AFE7257F358CB952ABFD0BF51703704091EE9C342AB1EA20A408DB41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 0055E833
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Exception@8Throw
                                                              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                              • API String ID: 2005118841-1866435925
                                                              • Opcode ID: 64251097121c642b18977544799c08406e4f5e552c74fc56ee805ab01eac976c
                                                              • Instruction ID: 8b91086addd5f5d6e57d9de3e4ed642792b65eed21704d6b11fc9104b9604656
                                                              • Opcode Fuzzy Hash: 64251097121c642b18977544799c08406e4f5e552c74fc56ee805ab01eac976c
                                                              • Instruction Fuzzy Hash: 8701DF305443496AE71CEA94C82BFFD7F98BB58703F00484AFD15A5082FA606B09C662
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegCreateKeyW.ADVAPI32(80000001,00000000,005C52D8), ref: 0056381F
                                                              • RegSetValueExW.ADVAPI32(005C52D8,?,00000000,00000001,00000000,00000000,005C52F0,?,0055F823,pth_unenc,005C52D8), ref: 0056384D
                                                              • RegCloseKey.ADVAPI32(005C52D8,?,0055F823,pth_unenc,005C52D8), ref: 00563858
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseCreateValue
                                                              • String ID: pth_unenc
                                                              • API String ID: 1818849710-4028850238
                                                              • Opcode ID: 9bed5c13b0d670f2b9dc02ad0cad934a1c71b3da021c043a6cc21275aa10f6a6
                                                              • Instruction ID: 4915845894c0dfab8da8c0396fbb1429bb0f0f77b933f977d78db0df5f399e22
                                                              • Opcode Fuzzy Hash: 9bed5c13b0d670f2b9dc02ad0cad934a1c71b3da021c043a6cc21275aa10f6a6
                                                              • Instruction Fuzzy Hash: 41F04972540128BBDF109FA1EC5ABEA3B6CFF46791F104525BD0697150EB319B08EAA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetModuleHandleA.KERNEL32(KERNEL32,0043143A), ref: 0043CA79
                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0043CA89
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AddressHandleModuleProc
                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                              • API String ID: 1646373207-3105848591
                                                              • Opcode ID: f5942bad6fb0379af524b8fc5daf5af3d6fb922da830d66f21d94f1b5bcb83af
                                                              • Instruction ID: 8c0865540f6c5b330ea810b8011c9f56007bea3fab0405eb604f0991b59ca9d9
                                                              • Opcode Fuzzy Hash: f5942bad6fb0379af524b8fc5daf5af3d6fb922da830d66f21d94f1b5bcb83af
                                                              • Instruction Fuzzy Hash: A1F01D21A40B0DE2DB00ABA5AC4B36F7A75BB84743F9104A1D592F1096DF74C179D74A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ReadFile.KERNEL32(?,?,?,O>@,00000000,?,00403E4F,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 0040366B
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FileRead
                                                              • String ID: .\QHImageHlp.c$O>@$ReadFile()
                                                              • API String ID: 2738559852-3347983201
                                                              • Opcode ID: ad8c54c6b13db8c91e8405195e36127eca5c805619a3687134a11327e549964d
                                                              • Instruction ID: e18dff2bf5f9ec833f0eb136256613232d54e553c4a64e595da327690e970206
                                                              • Opcode Fuzzy Hash: ad8c54c6b13db8c91e8405195e36127eca5c805619a3687134a11327e549964d
                                                              • Instruction Fuzzy Hash: 99E022B179030039F630A630AE47F2726488B84B03F20483FB449A06C1FDFD9840216A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateThread.KERNEL32(00000000,00000000,Function_0001D45D,00000000,00000000,00000000), ref: 00566C47
                                                              • ShowWindow.USER32(00000009), ref: 00566C61
                                                              • SetForegroundWindow.USER32 ref: 00566C6D
                                                                • Part of subcall function 0056CD9B: AllocConsole.KERNEL32(005C5338), ref: 0056CDA4
                                                                • Part of subcall function 0056CD9B: ShowWindow.USER32(00000000,00000000), ref: 0056CDBD
                                                                • Part of subcall function 0056CD9B: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0056CDE2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                              • String ID: !DU
                                                              • API String ID: 3446828153-1239079615
                                                              • Opcode ID: f0c3d93d192d06b54c39b0744b3a1dbb768c325196a1b814d1305e60c0d51c94
                                                              • Instruction ID: 4c6f77a9bdfa93f94ffee4a52814d2dc872656ac4b7dd7b46ab25e697564dd65
                                                              • Opcode Fuzzy Hash: f0c3d93d192d06b54c39b0744b3a1dbb768c325196a1b814d1305e60c0d51c94
                                                              • Instruction Fuzzy Hash: CFF05E74118541AEDB20AB61EC1EF7A7F68FFB5351F00082AF846C60A1DF214C4DAA61
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • <%08X> %02hu:%02hu:%02hu: , xrefs: 0040914A
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CurrentLocalThreadTime__swprintf
                                                              • String ID: <%08X> %02hu:%02hu:%02hu:
                                                              • API String ID: 4156772881-2163415560
                                                              • Opcode ID: a489dfab2371dc3eae81d2dfc5bda05dd664b81eb9ee3823ab1e5aa6a003ac84
                                                              • Instruction ID: be5f41c029d6ecaa3ec51ae336b2f33e16603824fff27754019517003b9c3123
                                                              • Opcode Fuzzy Hash: a489dfab2371dc3eae81d2dfc5bda05dd664b81eb9ee3823ab1e5aa6a003ac84
                                                              • Instruction Fuzzy Hash: 35F08276400711BBC3106B198D458BB76E8EEC4711B448956FC85C6292F678DD24C2A5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 00566130
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExecuteShell
                                                              • String ID: /C $cmd.exe$open
                                                              • API String ID: 587946157-3896048727
                                                              • Opcode ID: 5bc6f014b336afa499155f0af01907a697af151416fcbbe02ebbdb3ba8275f4f
                                                              • Instruction ID: 0e36376cb4af2ff8dec404c4c89d89ebc13c8422e98a4a9f05f0342f5bfb0b27
                                                              • Opcode Fuzzy Hash: 5bc6f014b336afa499155f0af01907a697af151416fcbbe02ebbdb3ba8275f4f
                                                              • Instruction Fuzzy Hash: D2E0C0701087456ACB08E674DCAADAB7FADBE90706F400C1E754392092EF64AD4DCA69
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • TerminateThread.KERNEL32(Function_0000A27D,00000000,005C52F0,pth_unenc,0055D0B8,005C52D8,005C52F0,?,pth_unenc), ref: 0055B8BB
                                                              • UnhookWindowsHookEx.USER32(005C50F0), ref: 0055B8C7
                                                              • TerminateThread.KERNEL32(Function_0000A267,00000000,?,pth_unenc), ref: 0055B8D5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: TerminateThread$HookUnhookWindows
                                                              • String ID: pth_unenc
                                                              • API String ID: 3123878439-4028850238
                                                              • Opcode ID: 341e8fbd40bcc19157a1645a9fb2738107a0eae574db79ef12b82c7ac01c5b84
                                                              • Instruction ID: c3b314117fe9b5cdbb7907cdc202c2171bbaf33eca63c5232ea02c18224cbb9f
                                                              • Opcode Fuzzy Hash: 341e8fbd40bcc19157a1645a9fb2738107a0eae574db79ef12b82c7ac01c5b84
                                                              • Instruction Fuzzy Hash: F8E01276205366EFEB241F949CA98657EEEFE25787314083FF6C242560C6710C0CDB50
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 005514B9
                                                              • GetProcAddress.KERNEL32(00000000), ref: 005514C0
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressLibraryLoadProc
                                                              • String ID: GetLastInputInfo$User32.dll
                                                              • API String ID: 2574300362-1519888992
                                                              • Opcode ID: 4a3e5315ab444f2939789aedd1051f9f42ba8c918f1b62c5bad1a477da80341f
                                                              • Instruction ID: 177fff20dce3425ebf079fe700103036dfc2a2df82d3d2222ebed0c35b66db0f
                                                              • Opcode Fuzzy Hash: 4a3e5315ab444f2939789aedd1051f9f42ba8c918f1b62c5bad1a477da80341f
                                                              • Instruction Fuzzy Hash: F1B092B95C1610ABCB005BA8AC0ED993EA8BA75702300404AB801D1160DBB02008AFA9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: __alldvrm$_strrchr
                                                              • String ID:
                                                              • API String ID: 1036877536-0
                                                              • Opcode ID: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                              • Instruction ID: f6c9b81d3467e7e042596a59d3b520ff873ddcaa80e3e4493a6393081d0b0b9d
                                                              • Opcode Fuzzy Hash: 4f8832beee02cc7ac8349e43431f1a5ed1ce449240751d3aeed044ff3a2741d2
                                                              • Instruction Fuzzy Hash: 46A13635A043869FEF21CF58C8817AEBFE5FF55314F144169E8959B282D3398941C7A2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b40ed74c97168db56e5e5f893fcc63f2281cb0c0192d1aa31597210dbde1510
                                                              • Instruction ID: fb5ca3981a6db0d135ff955cf773892fcf9d27e3ec8726e30d67e2e9fc8ed4eb
                                                              • Opcode Fuzzy Hash: 2b40ed74c97168db56e5e5f893fcc63f2281cb0c0192d1aa31597210dbde1510
                                                              • Instruction Fuzzy Hash: 2241F971A00305BFDB24AF78CC45B5A7FE9FBC8710F10452AF155DB691D67199418790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0044E834
                                                              • __isleadbyte_l.LIBCMT ref: 0044E868
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000002,?,00000000,00000000,?,?,?,00000298,00000002,00000000), ref: 0044E899
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000002,00000001,00000000,00000000,?,?,?,00000298,00000002,00000000), ref: 0044E907
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                              • String ID:
                                                              • API String ID: 3058430110-0
                                                              • Opcode ID: 29de12d916317f776575526a2aae219ef267f97f715b5e650989a8b0b88a1db2
                                                              • Instruction ID: 69bd48404784bb6eef6378d994ded7f0c02fa3b1a2743158cb33e4a36fb9aac3
                                                              • Opcode Fuzzy Hash: 29de12d916317f776575526a2aae219ef267f97f715b5e650989a8b0b88a1db2
                                                              • Instruction Fuzzy Hash: AF31B331A00255EFEF20EF66C8809BF7BA5FF01311F1445AAE4518B292E734DD40DB99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • Cleared browsers logins and cookies., xrefs: 0055C0F5
                                                              • [Cleared browsers logins and cookies.], xrefs: 0055C0E4
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Sleep
                                                              • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                              • API String ID: 3472027048-1236744412
                                                              • Opcode ID: 1479fc3cc2f00da66388640359fcc79c4735f041765218a0ba0f4209d3e36abe
                                                              • Instruction ID: effa7d51191008b037a552c1146449f2c84067b0b40461a720d75ddd3508097e
                                                              • Opcode Fuzzy Hash: 1479fc3cc2f00da66388640359fcc79c4735f041765218a0ba0f4209d3e36abe
                                                              • Instruction Fuzzy Hash: 2131D405249381AEEA15ABB4587E7EE7F826FE3746F08445EBCC40B3E3C952480D9363
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: allocator
                                                              • String ID:
                                                              • API String ID: 3447690668-0
                                                              • Opcode ID: 55a0b2266a5cad73a88afd20eacca5d9b6afaa86621e6d19beb791bcb8099d20
                                                              • Instruction ID: 098981022932cbdec035ca30eccc90540c584fe7df76098104e9694cbdb6509b
                                                              • Opcode Fuzzy Hash: 55a0b2266a5cad73a88afd20eacca5d9b6afaa86621e6d19beb791bcb8099d20
                                                              • Instruction Fuzzy Hash: 1D315EB1E001089FDB04DF99D841BEFBBB9EF48318F54452AE505A7382D73969148BB6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0056C551: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0056C561
                                                                • Part of subcall function 0056C551: GetWindowTextLengthW.USER32(00000000), ref: 0056C56A
                                                                • Part of subcall function 0056C551: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0056C594
                                                              • Sleep.KERNEL32(000001F4), ref: 0055A573
                                                              • Sleep.KERNEL32(00000064), ref: 0055A5FD
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Window$SleepText$ForegroundLength
                                                              • String ID: [ $ ]
                                                              • API String ID: 3309952895-93608704
                                                              • Opcode ID: de7a0ba232dffb4c41b5ff6b284417d79f8644215d6d1e7d72b8f36d72ea5dcb
                                                              • Instruction ID: 2bf5de2bc08c851ebf88c6373725d46eaf0eb3187e3beb615dbcf91139561c75
                                                              • Opcode Fuzzy Hash: de7a0ba232dffb4c41b5ff6b284417d79f8644215d6d1e7d72b8f36d72ea5dcb
                                                              • Instruction Fuzzy Hash: 261162315046015BC614BB74CC6B9AF7FA87F91302F40051EF957560E2FF21AA5CC696
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 96b42576b6a2345273cdcf84020880551165e338762428740c07b50ac7c8a6ff
                                                              • Instruction ID: f5e6a14a2355f3643d8ab79ae5e4eb3b2bdb5ac8019528eadbf7e70c57aa2e78
                                                              • Opcode Fuzzy Hash: 96b42576b6a2345273cdcf84020880551165e338762428740c07b50ac7c8a6ff
                                                              • Instruction Fuzzy Hash: DF01F2B3609616BEEF201A786CC4F676A1DFB917B9B340726F470A11D1EAA08E005160
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d86ee573496b0ea6077d5559f931faa23a5f061d92d941d5a9f409692e9d2b61
                                                              • Instruction ID: dc865f86023eb6c9ebd50630ff00a2ba6b73f9783ea0634140ff815164d0b68c
                                                              • Opcode Fuzzy Hash: d86ee573496b0ea6077d5559f931faa23a5f061d92d941d5a9f409692e9d2b61
                                                              • Instruction Fuzzy Hash: 8701F9B2609612BEEF111ABCACC4D277A5DFF913B93340726F531511E1DB708E045160
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0059850D,00000000,00000000,00000000,00000000,?,00598839,00000006,FlsSetValue), ref: 00598598
                                                              • GetLastError.KERNEL32(?,0059850D,00000000,00000000,00000000,00000000,?,00598839,00000006,FlsSetValue,005AF160,005AF168,00000000,00000364,?,005982E7), ref: 005985A4
                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0059850D,00000000,00000000,00000000,00000000,?,00598839,00000006,FlsSetValue,005AF160,005AF168,00000000), ref: 005985B2
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LibraryLoad$ErrorLast
                                                              • String ID:
                                                              • API String ID: 3177248105-0
                                                              • Opcode ID: 80904f2f75869883cf1108f92ce7ab0da073ccf3ee265ab307479ca98a535008
                                                              • Instruction ID: d0b444c1c0de04b554d6196a6b071e0c4c27cc0c18904eb966a3bcf942bff2d0
                                                              • Opcode Fuzzy Hash: 80904f2f75869883cf1108f92ce7ab0da073ccf3ee265ab307479ca98a535008
                                                              • Instruction Fuzzy Hash: 5E01D836606232BBCF214B689C44A677F58BF577A1B164520ED06D7240DF30DD08DAE0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0055A843), ref: 0056C49E
                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0056C4B2
                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0056C4D7
                                                              • CloseHandle.KERNEL32(00000000), ref: 0056C4E5
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$CloseCreateHandleReadSize
                                                              • String ID:
                                                              • API String ID: 3919263394-0
                                                              • Opcode ID: f64233f3f56235af16402c12acce09afd3083912695df8144564e1f4c45244b2
                                                              • Instruction ID: 614e08c7dfb375a2c5572273be5d141deaaf38ca079fa00a06b03e46ef368643
                                                              • Opcode Fuzzy Hash: f64233f3f56235af16402c12acce09afd3083912695df8144564e1f4c45244b2
                                                              • Instruction Fuzzy Hash: 83F0FC712012187FEA105B24AC94FBB3F5CFBC77A6F00051AF941E31C0CA154C099231
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                              • String ID:
                                                              • API String ID: 3016257755-0
                                                              • Opcode ID: afc8384d7de5dc81d749eb2ef2e502e72940c946d5071aaa17129bf9d5fb4602
                                                              • Instruction ID: 8ded30c4d0808139d0a8f7a3334d2637decb54840f1bc3447c4a2fd338d10340
                                                              • Opcode Fuzzy Hash: afc8384d7de5dc81d749eb2ef2e502e72940c946d5071aaa17129bf9d5fb4602
                                                              • Instruction Fuzzy Hash: AE117BB600014ABBCF125E85CC85DEE3F62BF1C354F5A9416FE1868131C73AD9B2AB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0056C1F5
                                                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0056C208
                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0056C233
                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0056C23B
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CloseHandleOpenProcess
                                                              • String ID:
                                                              • API String ID: 39102293-0
                                                              • Opcode ID: 31c26421f554f15c0939451b800a281a23889b1b0ddeb7fdf58f0de6d1e0b633
                                                              • Instruction ID: 36ceab62d03375c1ff1696ec48ba60e47cc744a04d2f5b48f5018b5427c49778
                                                              • Opcode Fuzzy Hash: 31c26421f554f15c0939451b800a281a23889b1b0ddeb7fdf58f0de6d1e0b633
                                                              • Instruction Fuzzy Hash: F20126B52402256BDA1053D49C5DF7BBF7CFB95795F000052FEC9C3291EE609D458671
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0058987A
                                                                • Part of subcall function 00589EB2: ___AdjustPointer.LIBCMT ref: 00589EFC
                                                              • _UnwindNestedFrames.LIBCMT ref: 00589891
                                                              • ___FrameUnwindToState.LIBVCRUNTIME ref: 005898A3
                                                              • CallCatchBlock.LIBVCRUNTIME ref: 005898C7
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                              • String ID:
                                                              • API String ID: 2633735394-0
                                                              • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                              • Instruction ID: db6ad42773e523be555dbbeaff42508d93f9dc4f479c496ebb7000329e50d61e
                                                              • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                              • Instruction Fuzzy Hash: 6C01053200010AABDF12AF55CC05EEA3FBAFF89750F084514FD1876120C736E8619BA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __FF_MSGBANNER.LIBCMT ref: 0042FAB9
                                                                • Part of subcall function 00435C3E: __set_error_mode.LIBCMT ref: 00435C40
                                                                • Part of subcall function 00435C3E: __set_error_mode.LIBCMT ref: 00435C4D
                                                                • Part of subcall function 00435C3E: __NMSG_WRITE.LIBCMT ref: 00435C65
                                                                • Part of subcall function 00435C3E: __NMSG_WRITE.LIBCMT ref: 00435C6F
                                                              • __NMSG_WRITE.LIBCMT ref: 0042FAC0
                                                                • Part of subcall function 00435A6D: __set_error_mode.LIBCMT ref: 00435A9E
                                                                • Part of subcall function 00435A6D: __set_error_mode.LIBCMT ref: 00435AAF
                                                                • Part of subcall function 00435A6D: _strcpy_s.LIBCMT ref: 00435AE3
                                                                • Part of subcall function 00435A6D: __invoke_watson.LIBCMT ref: 00435AF4
                                                                • Part of subcall function 00435A6D: GetModuleFileNameA.KERNEL32(00000000,0046A8A9,00000104,?,?,00002000), ref: 00435B10
                                                                • Part of subcall function 00435A6D: _strcpy_s.LIBCMT ref: 00435B25
                                                                • Part of subcall function 00435A6D: __invoke_watson.LIBCMT ref: 00435B38
                                                                • Part of subcall function 00435A6D: _strlen.LIBCMT ref: 00435B41
                                                                • Part of subcall function 00435A6D: _strlen.LIBCMT ref: 00435B4E
                                                                • Part of subcall function 00435A6D: __invoke_watson.LIBCMT ref: 00435B7B
                                                                • Part of subcall function 0043157F: ___crtCorExitProcess.LIBCMT ref: 00431587
                                                                • Part of subcall function 0043157F: ExitProcess.KERNEL32 ref: 00431590
                                                              • HeapAlloc.KERNEL32(00000000,?), ref: 0042FAEC
                                                              • HeapAlloc.KERNEL32(00000000,?), ref: 0042FB1C
                                                                • Part of subcall function 0042FA5C: __lock.LIBCMT ref: 0042FA79
                                                                • Part of subcall function 0042FA5C: ___sbh_alloc_block.LIBCMT ref: 0042FA84
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __set_error_mode$__invoke_watson$AllocExitHeapProcess_strcpy_s_strlen$FileModuleName___crt___sbh_alloc_block__lock
                                                              • String ID:
                                                              • API String ID: 913549098-0
                                                              • Opcode ID: 20a47c1bc0b3e505c4640fd5fbb8dac699cbe65c5832f50e0c64fbac4b9dec48
                                                              • Instruction ID: c97f2a1aac4336ca4233bb19fb3288db2da53e8740355d76d5640405a136ac55
                                                              • Opcode Fuzzy Hash: 20a47c1bc0b3e505c4640fd5fbb8dac699cbe65c5832f50e0c64fbac4b9dec48
                                                              • Instruction Fuzzy Hash: 19F0CD31A406256AEA205B15FC41F673764EF14368F901036FC1DE62E1D7A9AC908A9D
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetSystemMetrics.USER32(0000004C), ref: 005693F0
                                                              • GetSystemMetrics.USER32(0000004D), ref: 005693F6
                                                              • GetSystemMetrics.USER32(0000004E), ref: 005693FC
                                                              • GetSystemMetrics.USER32(0000004F), ref: 00569402
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: MetricsSystem
                                                              • String ID:
                                                              • API String ID: 4116985748-0
                                                              • Opcode ID: 6e39856485ed1501e7168f812fdd8b57f09975f632fc2d0b43b3c0f139507f3e
                                                              • Instruction ID: db50abb709919332961a41ffcb23271754bd0292fb35d51fa04b3eee9c7b592c
                                                              • Opcode Fuzzy Hash: 6e39856485ed1501e7168f812fdd8b57f09975f632fc2d0b43b3c0f139507f3e
                                                              • Instruction Fuzzy Hash: 06F08CB1B043165BDB50EA658845A2AAED9FBD4260F10093EE2198B281EEB4DC068B81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __getptd.LIBCMT ref: 00436B01
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __getptd.LIBCMT ref: 00436B18
                                                              • __amsg_exit.LIBCMT ref: 00436B26
                                                              • __lock.LIBCMT ref: 00436B36
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                              • String ID:
                                                              • API String ID: 3521780317-0
                                                              • Opcode ID: 6797a9c7ad89f79179c35410063c93c7be1a48fe7305491068951a5592eb683d
                                                              • Instruction ID: 69a392eba205855c063e8f8e15178e0c3a3eead262de5f737cc13f3cb72de6a7
                                                              • Opcode Fuzzy Hash: 6797a9c7ad89f79179c35410063c93c7be1a48fe7305491068951a5592eb683d
                                                              • Instruction Fuzzy Hash: 24F06231900711AAD610BB76840674DB7A06B08719F11A15FE441972D2DBACA901CF5E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 0042FC60
                                                                • Part of subcall function 004359B0: __FindPESection.LIBCMT ref: 00435A0B
                                                              • __getptd_noexit.LIBCMT ref: 0042FC70
                                                              • __freeptd.LIBCMT ref: 0042FC7A
                                                              • ExitThread.KERNEL32 ref: 0042FC83
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: CurrentExitFindImageNonwritableSectionThread__freeptd__getptd_noexit
                                                              • String ID:
                                                              • API String ID: 3182216644-0
                                                              • Opcode ID: eb11f72c5c0a27ea54c39caa1cddff4bcdd230f116779656fea8b8d54851e959
                                                              • Instruction ID: 7fb2935e2eb5082df97cbdfaa4370d91d3abcb1d53863283408d7954f040c305
                                                              • Opcode Fuzzy Hash: eb11f72c5c0a27ea54c39caa1cddff4bcdd230f116779656fea8b8d54851e959
                                                              • Instruction Fuzzy Hash: B5D01270140B055AD6142773ED1E71B36686B24766FD81077BC00901B2DF7CE88DC91E
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast_malloc
                                                              • String ID: .\QHImageHlp.c
                                                              • API String ID: 1018170914-3639949391
                                                              • Opcode ID: 15c5622575b640bfbf16fac63390eca48eb95dedee77b54ee0b13ad915d23e3b
                                                              • Instruction ID: cd3631b3a4313c074cd8665c0dc88d8e640489f143659dcbe8033afe21fc79ee
                                                              • Opcode Fuzzy Hash: 15c5622575b640bfbf16fac63390eca48eb95dedee77b54ee0b13ad915d23e3b
                                                              • Instruction Fuzzy Hash: 99419DB2A01705AFC724DF1DD880A96BBE4FF44314F84863ED84997311E77AE6298BD1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,00002000), ref: 004055FC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 973152223-3914906174
                                                              • Opcode ID: 2c843a153be4ab8f41abaeefdffeacd9e125d3a162f82d77d6fe0992c1cd8e6f
                                                              • Instruction ID: af7915da689cad80124b57681fae3e82e07b953628dcdcdd22db9ddc04efbc6b
                                                              • Opcode Fuzzy Hash: 2c843a153be4ab8f41abaeefdffeacd9e125d3a162f82d77d6fe0992c1cd8e6f
                                                              • Instruction Fuzzy Hash: B731D5767003156BD720DE25EC80EAB7395EBC8B56F44443AFD08E7380EA79AD058BA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00584770: __onexit.LIBCMT ref: 00584776
                                                              • __Init_thread_footer.LIBCMT ref: 0055B797
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Init_thread_footer__onexit
                                                              • String ID: [End of clipboard]$[Text copied to clipboard]
                                                              • API String ID: 1881088180-3686566968
                                                              • Opcode ID: 9cc285ef5fd6b6422a9091b1608de2aa8357c959f783a599e748e22fbf7e9791
                                                              • Instruction ID: d5f4c4e0bd10c8eb6fb690d8d7a09b70fba56b90998bc89d0645c40950775c2d
                                                              • Opcode Fuzzy Hash: 9cc285ef5fd6b6422a9091b1608de2aa8357c959f783a599e748e22fbf7e9791
                                                              • Instruction Fuzzy Hash: E2217131A1050A5ADB14F774E8AA9EDBF79BF94312F40052AE90653192EF306E4ECB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,005A1D92,?,00000050,?,?,?,?,?), ref: 005A1C12
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ACP$OCP
                                                              • API String ID: 0-711371036
                                                              • Opcode ID: 8811fd5b43106b835546d43f6f4e8332e5cb032c875dc247512665c51b7748f1
                                                              • Instruction ID: f39b4d00daa2f49edc6ec51c0b2113ec263265e9edcf2293b5676385e1f805ac
                                                              • Opcode Fuzzy Hash: 8811fd5b43106b835546d43f6f4e8332e5cb032c875dc247512665c51b7748f1
                                                              • Instruction Fuzzy Hash: 8F212D22A44904A6D734DF64CA0179F7AAAFF52B71F558560E90AD7100F731DD40C378
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • _malloc.LIBCMT ref: 00405A79
                                                                • Part of subcall function 0042FB25: __FF_MSGBANNER.LIBCMT ref: 0042FB48
                                                                • Part of subcall function 0042FB25: __NMSG_WRITE.LIBCMT ref: 0042FB4F
                                                                • Part of subcall function 0042FB25: HeapAlloc.KERNEL32(00000000,?,00000000,?,?,?,00402AFA), ref: 0042FB9C
                                                              • SetLastError.KERNEL32(00000008,?), ref: 00405A89
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: AllocErrorHeapLast_malloc
                                                              • String ID: .\QHImageHlp.c
                                                              • API String ID: 485325758-3639949391
                                                              • Opcode ID: 0f050a3acdf6a18f2331fc905689a8070437466b217d773e7a30d2c2608276d3
                                                              • Instruction ID: 4491f1e142483b7a0147f93706028f95dcf45ea172aec906f31b60bdc4f22acb
                                                              • Opcode Fuzzy Hash: 0f050a3acdf6a18f2331fc905689a8070437466b217d773e7a30d2c2608276d3
                                                              • Instruction Fuzzy Hash: 8421C7B1B40B046BD360DF6AEC81B53F7E4FB44714F80453EE94A92741EB7AB1188B99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • Sleep.KERNEL32 ref: 00566640
                                                              • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 005666A2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DownloadFileSleep
                                                              • String ID: !DU
                                                              • API String ID: 1931167962-1239079615
                                                              • Opcode ID: 200e7ac98cba2b81500d2df9f3ac766dad22654517fad868f35d5ded72eda8bc
                                                              • Instruction ID: fd9f0548a96bdfca1711c3776bb7e2527ebdba8f69412328a0d614982c0b6bab
                                                              • Opcode Fuzzy Hash: 200e7ac98cba2b81500d2df9f3ac766dad22654517fad868f35d5ded72eda8bc
                                                              • Instruction Fuzzy Hash: F71151716086429ACB14FB70D8BAA7E7FA8BF94301F400C6EF84243092EF34990DC726
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LocalTime
                                                              • String ID: | $%02i:%02i:%02i:%03i
                                                              • API String ID: 481472006-2430845779
                                                              • Opcode ID: 458c4c6565c4d3050b7312f902efda8f703bab1afff49354336bc8cc5ce3f454
                                                              • Instruction ID: 54ee092183cc8cfb45b0d0907a5300a9f4687ee7e6ed7fa035b83ce2f21689fa
                                                              • Opcode Fuzzy Hash: 458c4c6565c4d3050b7312f902efda8f703bab1afff49354336bc8cc5ce3f454
                                                              • Instruction Fuzzy Hash: 5B1151714082455AC304EB65E8699FEBFE8BF94341F50091FF896831D1EF24EA4DC766
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetLastError.KERNEL32(00000008,BB40E64E,?,?,0046AFB0,0040BC07), ref: 00408A9D
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408A2C
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408A64
                                                                • Part of subcall function 00408A00: __CxxThrowException@8.LIBCMT ref: 00408AD0
                                                              Strings
                                                              • F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h, xrefs: 00408AAD
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: Exception@8Throw$ErrorLast
                                                              • String ID: F:\WorkCode\Pub\360GPUBNew\dev\include\Interface\QHTL.h
                                                              • API String ID: 3499917866-3244885242
                                                              • Opcode ID: 02cc4916ce66fc9f49ac957b759d5bf510f036ab9fdb672491d1735664b6ec29
                                                              • Instruction ID: 8a3096ca1bbf558694c1877c0cbee3ffcdde9a91d7c3d9ee8e518dbb288f5ca6
                                                              • Opcode Fuzzy Hash: 02cc4916ce66fc9f49ac957b759d5bf510f036ab9fdb672491d1735664b6ec29
                                                              • Instruction Fuzzy Hash: 7901A2B1944708BFC700EB95CD41F6BB7BCFB48B14F60452EB514A2281E7B895048B66
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              • %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s, xrefs: 00408C9C
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __snwprintf_wcschr
                                                              • String ID: %1d|%04hu-%02hu-%02hu|%02hu:%02hu:%02hu|%s|%d|%s|%s|%d|%s
                                                              • API String ID: 1333472643-1296420124
                                                              • Opcode ID: 352b012345a64a84e7e5e2f65a586d5f98df0d664cd4b9c6f40050a57f8bcf49
                                                              • Instruction ID: 482bac71ccbccd4038da37c31077ade87015c13c61ee081a78d39986d3540162
                                                              • Opcode Fuzzy Hash: 352b012345a64a84e7e5e2f65a586d5f98df0d664cd4b9c6f40050a57f8bcf49
                                                              • Instruction Fuzzy Hash: 34110CB2210B10AAD720DB69DC45FB7B3F8EF8C701F00891EF69E86250E678A841C775
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 0055B164: GetLocalTime.KERNEL32(?,Offline Keylogger Started,?), ref: 0055B172
                                                                • Part of subcall function 0055B164: wsprintfW.USER32 ref: 0055B1F3
                                                                • Part of subcall function 0056B4EF: GetLocalTime.KERNEL32(00000000), ref: 0056B509
                                                              • CloseHandle.KERNEL32(?), ref: 0055B0B4
                                                              • UnhookWindowsHookEx.USER32 ref: 0055B0C7
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                              • String ID: Online Keylogger Stopped
                                                              • API String ID: 1623830855-1496645233
                                                              • Opcode ID: 1be8d56b3abc9844feef70421900c59ccbbec8bb816eecb782390e9fbe0123bd
                                                              • Instruction ID: 034ca8d3407fb7fd2ca4d8a6c7bf2a40b86e5d1cf923ef82b2e87746300ac254
                                                              • Opcode Fuzzy Hash: 1be8d56b3abc9844feef70421900c59ccbbec8bb816eecb782390e9fbe0123bd
                                                              • Instruction Fuzzy Hash: B701F535A002055BEB257B34C82F7BE7FB5BB82302F40045EE842035E2EB61285DD7D2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • waveInPrepareHeader.WINMM(?,00000020,?,?,005C6B50,005C4EE0,?,00000000,00551A15), ref: 00551849
                                                              • waveInAddBuffer.WINMM(?,00000020,?,00000000,00551A15), ref: 0055185F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: wave$BufferHeaderPrepare
                                                              • String ID: XM\
                                                              • API String ID: 2315374483-3135539853
                                                              • Opcode ID: ad51a3edfaf059b3dc4b546e00c92bb32bb98db263a30e667c68e1b81c332264
                                                              • Instruction ID: 07e8570c631d764872c4403e773505761f016d1c563e5c5e6f03af8272d905d3
                                                              • Opcode Fuzzy Hash: ad51a3edfaf059b3dc4b546e00c92bb32bb98db263a30e667c68e1b81c332264
                                                              • Instruction Fuzzy Hash: F601AD71700A11AFD710AF25EC58E297FA9FFA9301B00012AF80AC3721EB715C19DBA0
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00430A3C: __getptd.LIBCMT ref: 00430A42
                                                                • Part of subcall function 00430A3C: __getptd.LIBCMT ref: 00430A52
                                                              • __getptd.LIBCMT ref: 0043B2D4
                                                                • Part of subcall function 00435303: __getptd_noexit.LIBCMT ref: 00435306
                                                                • Part of subcall function 00435303: __amsg_exit.LIBCMT ref: 00435313
                                                              • __getptd.LIBCMT ref: 0043B2E2
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: __getptd$__amsg_exit__getptd_noexit
                                                              • String ID: csm
                                                              • API String ID: 803148776-1018135373
                                                              • Opcode ID: 7355461b1db248cca9ced8da74d115863494b1204ec6fd7d3153c7297fa21868
                                                              • Instruction ID: bd3a09f85d3860faa45ff0aba6a44e215a3c079e7dabb4cc9a01332ad76f74b8
                                                              • Opcode Fuzzy Hash: 7355461b1db248cca9ced8da74d115863494b1204ec6fd7d3153c7297fa21868
                                                              • Instruction Fuzzy Hash: 9D018630801315CACF38AF61D4507AFB3B4FF28319F24642FE885963A1CB788981CB99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • IsValidLocale.KERNEL32(00000000,JY,00000000,00000001,?,?,00594AEA,?,?,005944CA,?,00000004), ref: 00598B32
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LocaleValid
                                                              • String ID: IsValidLocaleName$JY
                                                              • API String ID: 1901932003-3861476880
                                                              • Opcode ID: be70a9d418664d2fac4710360ff295ac5f4d04aee4e0dc2a59fbbf1ef43ccebe
                                                              • Instruction ID: 7929fbb8b1eaecb5f1b39f998425a35b055600882f6fc12515fb82a8cdf14540
                                                              • Opcode Fuzzy Hash: be70a9d418664d2fac4710360ff295ac5f4d04aee4e0dc2a59fbbf1ef43ccebe
                                                              • Instruction Fuzzy Hash: 87F0E270A81619F7CF106BA0DC0AFBDBF59FF66B51F000169FD056A290DE715E019798
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0055C4F6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExistsFilePath
                                                              • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                              • API String ID: 1174141254-4188645398
                                                              • Opcode ID: 91fb42755a056660ad88b6e0f53aba617b9f7bfb5dad5c2e82b6aac551267e1b
                                                              • Instruction ID: e4f8ffd3b5b2d66ac49955c87c81ed0d6869c1d7e7e44ab09de62c0c3ca5caa0
                                                              • Opcode Fuzzy Hash: 91fb42755a056660ad88b6e0f53aba617b9f7bfb5dad5c2e82b6aac551267e1b
                                                              • Instruction Fuzzy Hash: A9F05E3190021A9A8B04B7F49C6F8FF7F68BE90742B400427BD02A21C2EE64AD49C6E5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0055C559
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExistsFilePath
                                                              • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                              • API String ID: 1174141254-2800177040
                                                              • Opcode ID: 3054657c66870970dd8b6a404d144ac5ae13ddd68d5c9780029169559907187d
                                                              • Instruction ID: b34e6182f3551401127fc263e4a3eb3ce2381ae3f124dd9acc62cc9dc6c67171
                                                              • Opcode Fuzzy Hash: 3054657c66870970dd8b6a404d144ac5ae13ddd68d5c9780029169559907187d
                                                              • Instruction Fuzzy Hash: ECF0543190021A9A8B14B7F4986B8EF7F6CBD90742B000427BD02521C2EE646989C6E5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0055C5BC
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExistsFilePath
                                                              • String ID: AppData$\Opera Software\Opera Stable\
                                                              • API String ID: 1174141254-1629609700
                                                              • Opcode ID: cb833ec47f8ff1bffaea39d91243179c9dbed830e8a2b198e41d9d39022e669c
                                                              • Instruction ID: 50028488f338f0a7585b1e48b9aeaf038dd65396f1336b9fa8e586cc1e0de776
                                                              • Opcode Fuzzy Hash: cb833ec47f8ff1bffaea39d91243179c9dbed830e8a2b198e41d9d39022e669c
                                                              • Instruction Fuzzy Hash: 34F05E31A0031A9A8B04F6F49C6F8EF7F68BD90702B400427BD06621D2EE64A989C6E1
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004036CB
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FileWrite
                                                              • String ID: .\QHImageHlp.c$WriteFile()
                                                              • API String ID: 3934441357-642506210
                                                              • Opcode ID: 235889d1a65ddb66482a612ad4d7e918c2c37313952fb2fc37993eef172bfc64
                                                              • Instruction ID: 202be2d2f577f9c48df27ca0d14b2a50dfdd427c70a255348a94a199852964d9
                                                              • Opcode Fuzzy Hash: 235889d1a65ddb66482a612ad4d7e918c2c37313952fb2fc37993eef172bfc64
                                                              • Instruction Fuzzy Hash: 61E092B67507003EF628A670AD97FA72648C784B47F20883FB145E55C2F9EC9900256A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetKeyState.USER32(00000011), ref: 0055B64B
                                                                • Part of subcall function 0055A3E0: GetForegroundWindow.USER32(?,?,005C50F0), ref: 0055A416
                                                                • Part of subcall function 0055A3E0: GetWindowThreadProcessId.USER32(00000000,?), ref: 0055A422
                                                                • Part of subcall function 0055A3E0: GetKeyboardLayout.USER32(00000000), ref: 0055A429
                                                                • Part of subcall function 0055A3E0: GetKeyState.USER32(00000010), ref: 0055A433
                                                                • Part of subcall function 0055A3E0: GetKeyboardState.USER32(?,?,005C50F0), ref: 0055A43E
                                                                • Part of subcall function 0055A3E0: ToUnicodeEx.USER32(005C5144,?,?,?,00000010,00000000,00000000), ref: 0055A461
                                                                • Part of subcall function 0055A3E0: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0055A4C1
                                                                • Part of subcall function 0055A636: SetEvent.KERNEL32(?,?,00000000,0055B20A,00000000), ref: 0055A662
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                              • String ID: [AltL]$[AltR]
                                                              • API String ID: 2738857842-2658077756
                                                              • Opcode ID: 105421cb534a60379f181e9de87ccefa84a2ddeef5dc55516d56db40dac7afc9
                                                              • Instruction ID: 0a8b3f7631ed10cd952b46ead10a8f4c3405dd70e88c57e223cb3975a42ac44a
                                                              • Opcode Fuzzy Hash: 105421cb534a60379f181e9de87ccefa84a2ddeef5dc55516d56db40dac7afc9
                                                              • Instruction Fuzzy Hash: 25E06D22700121139828323D693F6BD2E51AB82B52B82064FFC424B686DA9A4D0D43C3
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetOEMCP.KERNEL32(00000000,?,?,0059EF75,?), ref: 0059ED17
                                                              • GetACP.KERNEL32(00000000,?,?,0059EF75,?), ref: 0059ED2E
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: uY
                                                              • API String ID: 0-4107422020
                                                              • Opcode ID: 338136177684fa6d622e4afc92cf8e20452fcd7ded20532c5c94d49a6b275141
                                                              • Instruction ID: c3517d0a44e41f53b3355352759fcda2e6c56c6eb773fef61fa1f53823d7b8cb
                                                              • Opcode Fuzzy Hash: 338136177684fa6d622e4afc92cf8e20452fcd7ded20532c5c94d49a6b275141
                                                              • Instruction Fuzzy Hash: 92F0AF31400704DFDB20DB68DC89B687B71BB21335F244748E4358E9E1D7B19849DF81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 005661A8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ExecuteShell
                                                              • String ID: !DU$open
                                                              • API String ID: 587946157-227320051
                                                              • Opcode ID: 24c52c4c19e4530779d445c41990526949ece33a31e459d08bb298bf3366a06e
                                                              • Instruction ID: 95122317e3fa0a09cb3a39b1dfb4b7d70eaeccbd2ebc92350d787ea0195b9264
                                                              • Opcode Fuzzy Hash: 24c52c4c19e4530779d445c41990526949ece33a31e459d08bb298bf3366a06e
                                                              • Instruction Fuzzy Hash: EFE06D712482065AC614EA70ECAAABA7F5CBF90352F400C2AB90642482EF30580C8625
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetKeyState.USER32(00000012), ref: 0055B6A5
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: State
                                                              • String ID: [CtrlL]$[CtrlR]
                                                              • API String ID: 1649606143-2446555240
                                                              • Opcode ID: ce2539aed282489aeaf38f27872e714e0b977109b8687ee7a329987e42b9470e
                                                              • Instruction ID: d0f227f5452c5733cd706982b93f407db04d5663492f4270bbe10eb063b068e3
                                                              • Opcode Fuzzy Hash: ce2539aed282489aeaf38f27872e714e0b977109b8687ee7a329987e42b9470e
                                                              • Instruction Fuzzy Hash: 2FE0862170122117D924367D5A3F67D2E50BB52B52F41050FFC42875C5DE564D1853C2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                                • Part of subcall function 00584770: __onexit.LIBCMT ref: 00584776
                                                              • __Init_thread_footer.LIBCMT ref: 00560F29
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Init_thread_footer__onexit
                                                              • String ID: ,k\$0k\
                                                              • API String ID: 1881088180-3847103375
                                                              • Opcode ID: 4d6bbc8a9f410ed5c97c39151f97967dfab315e604d4c479aae594f9874038f3
                                                              • Instruction ID: 40a3ffa0435c92f99a50e91438cded28740d4ca0ec46caf924ba0c240742976c
                                                              • Opcode Fuzzy Hash: 4d6bbc8a9f410ed5c97c39151f97967dfab315e604d4c479aae594f9874038f3
                                                              • Instruction Fuzzy Hash: 15E0DF31114D128EC228F328948AE5A3FD4BB59325B60152AF810E72C1CF62BD819B58
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0055D144,00000000,005C52D8,005C52F0,?,pth_unenc), ref: 00563A31
                                                              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00563A45
                                                              Strings
                                                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00563A2F
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DeleteOpenValue
                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                              • API String ID: 2654517830-1051519024
                                                              • Opcode ID: c3948b436a8e4fe105f9984aab6eb13edff2d9d8285fd66ef7e666115c4caeb3
                                                              • Instruction ID: c0454e87042e52df65553d22cc64929d52d1a8f16e0ff79b1eadd5ee04f86428
                                                              • Opcode Fuzzy Hash: c3948b436a8e4fe105f9984aab6eb13edff2d9d8285fd66ef7e666115c4caeb3
                                                              • Instruction Fuzzy Hash: A1E0C23124421CBBEF104FB1DC0AFBA3B6CFB02B40F100298BA0692090C6628F08B660
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0055B876
                                                              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0055B8A1
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: DeleteDirectoryFileRemove
                                                              • String ID: pth_unenc
                                                              • API String ID: 3325800564-4028850238
                                                              • Opcode ID: 22ca88435987a3af62f9fc817c5c986ab2fec8829d5259b641b622fc50ef9bc3
                                                              • Instruction ID: 3c331b27a23edb6f10be47f074e0514a7e97adbaf77f76f2b16ba38dc5ead96d
                                                              • Opcode Fuzzy Hash: 22ca88435987a3af62f9fc817c5c986ab2fec8829d5259b641b622fc50ef9bc3
                                                              • Instruction Fuzzy Hash: F5E08C7A110A225BCB10AB389C6CBD63B9CBF55312B00045BE89393511DF24AC0DD660
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000), ref: 0040375F
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FilePointer
                                                              • String ID: .\QHImageHlp.c$SetFilePointerEx()
                                                              • API String ID: 973152223-3914906174
                                                              • Opcode ID: 71aa2a270ad45ce6d700e5ebd6e43204d34a3929848bd06162dfb3f87a5cca2d
                                                              • Instruction ID: 8f8977cb2d0b4ccc0947b00c7427ef8ecbdd6a3768c7b386d57dae8b174c95d6
                                                              • Opcode Fuzzy Hash: 71aa2a270ad45ce6d700e5ebd6e43204d34a3929848bd06162dfb3f87a5cca2d
                                                              • Instruction Fuzzy Hash: CCD05EB87803003AE61097309D86F2B329897C8F07F14886D7544F15D0F9FCE8006619
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: FileSize
                                                              • String ID: .\QHImageHlp.c$GetFileSizeEx()
                                                              • API String ID: 3433856609-1331291865
                                                              • Opcode ID: 0e9640600f9e4dc9bf96171d40720cf617bf7f8c4e8108b68e31724e6f487238
                                                              • Instruction ID: 7fe57b970132a0c306ad1d3e9a418fe7e91df63075c9b023bc58e2ed1317afab
                                                              • Opcode Fuzzy Hash: 0e9640600f9e4dc9bf96171d40720cf617bf7f8c4e8108b68e31724e6f487238
                                                              • Instruction Fuzzy Hash: 92C08CE4B9070436EA2827311F8BF6721896790F0BF4488BA7900E15C2FEFEC400602B
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: File
                                                              • String ID: .\QHImageHlp.c$SetEndOfFile()
                                                              • API String ID: 749574446-4247281097
                                                              • Opcode ID: 55f561706e4913504b1659c232cbceeeed4d33d718c83365b8535eeb1c4e46c9
                                                              • Instruction ID: 7b9951fb71824a071ea30372aa77385de4241c8a4e0098c10b8b1c0498ba7ca4
                                                              • Opcode Fuzzy Hash: 55f561706e4913504b1659c232cbceeeed4d33d718c83365b8535eeb1c4e46c9
                                                              • Instruction Fuzzy Hash: 60C08CB4B8070126EA2076312E4BF2B20899BE4F47F8488BAB404F25C2F9FCC5005019
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • TerminateProcess.KERNEL32(00000000,pth_unenc,0055F8C8), ref: 00562860
                                                              • WaitForSingleObject.KERNEL32(000000FF), ref: 00562873
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ObjectProcessSingleTerminateWait
                                                              • String ID: pth_unenc
                                                              • API String ID: 1872346434-4028850238
                                                              • Opcode ID: 528699d59d53b29c1586698837dfa111184bde0f6fca63f1a977325572296d4e
                                                              • Instruction ID: b7bcd0ec600fb6f9cab2cde5e0631598386c3291876c9d54ead2a182a9becddb
                                                              • Opcode Fuzzy Hash: 528699d59d53b29c1586698837dfa111184bde0f6fca63f1a977325572296d4e
                                                              • Instruction Fuzzy Hash: F7D01238189722BFD7350B64ED48F443B98AB36322F148205F422552F0C7A5442DFA20
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00551D55), ref: 00590D27
                                                              • GetLastError.KERNEL32 ref: 00590D35
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00590D90
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                              • String ID:
                                                              • API String ID: 1717984340-0
                                                              • Opcode ID: efa3e573b8d22aa6730b537cec99352a2ba145af2323927fbf0e5fe67080fe85
                                                              • Instruction ID: a850119d4ae21dc4409c83e8ebbe061ba72125f3189a5d32e986579efb6da3b6
                                                              • Opcode Fuzzy Hash: efa3e573b8d22aa6730b537cec99352a2ba145af2323927fbf0e5fe67080fe85
                                                              • Instruction Fuzzy Hash: D141E435600316AFDF219FA5C8447AABFB8FF41310F249969F955AB2E1DB30AD41C790
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00561EF0), ref: 00561B8C
                                                              • IsBadReadPtr.KERNEL32(?,00000014,00561EF0), ref: 00561C58
                                                              • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00561C7A
                                                              • SetLastError.KERNEL32(0000007E,00561EF0), ref: 00561C91
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4576038274.0000000000550000.00000040.00000400.00020000.00000000.sdmp, Offset: 00550000, based on PE: true
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_550000_tu.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastRead
                                                              • String ID:
                                                              • API String ID: 4100373531-0
                                                              • Opcode ID: c5eba0a3f530e5de7dd466025d9735105982b775cf3618d6f27b400017f85ce4
                                                              • Instruction ID: 1ecff133f8826c01c52668ef3aa4f67f2776ed43b1c0df61279bc9ac487b96fd
                                                              • Opcode Fuzzy Hash: c5eba0a3f530e5de7dd466025d9735105982b775cf3618d6f27b400017f85ce4
                                                              • Instruction Fuzzy Hash: BB419B752447059FE7248F18DD84B3ABBE8FF48710F08482DE98A8B651EB31ED04DB19
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              APIs
                                                              • GetLastError.KERNEL32(?,?,?,00408AFA,?,?,00000000,?,00403DA0,00403DA0,.\QHImageHlp.c,000000F9,SetFilePointerEx(),?,00403F3C,00000000), ref: 00408953
                                                              • SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408960
                                                                • Part of subcall function 00408380: GetLastError.KERNEL32(00000005,?,00065844,?,00408984,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040), ref: 00408395
                                                                • Part of subcall function 00408380: SetLastError.KERNEL32(00000000,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083B9
                                                                • Part of subcall function 00408380: GetLastError.KERNEL32(?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004083DA
                                                                • Part of subcall function 00408380: _wcsrchr.LIBCMT ref: 00408443
                                                                • Part of subcall function 00408380: _wcsncpy.LIBCMT ref: 00408472
                                                              • SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 00408999
                                                                • Part of subcall function 00432DB5: __getptd_noexit.LIBCMT ref: 00432DB5
                                                              • SetLastError.KERNEL32(?,?,?,?,?,?,00403F3C,00000000,00000000,00000CCC,00000040,?,00004000), ref: 004089DA
                                                              Memory Dump Source
                                                              • Source File: 00000005.00000002.4570950134.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000005.00000002.4570408781.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4572028478.000000000045C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4573951122.0000000000467000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000005.00000002.4574149945.000000000046D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_5_2_400000_tu.jbxd
                                                              Similarity
                                                              • API ID: ErrorLast$__getptd_noexit_wcsncpy_wcsrchr
                                                              • String ID:
                                                              • API String ID: 2296084122-0
                                                              • Opcode ID: 0d298b0919d4d87294302c951d50e0ecb365de6b4711658db1946db0a2c4a62c
                                                              • Instruction ID: 0ce4ff69a4c326d3965e6ec2f1d0d00c710584094203b3b5be746183993221b1
                                                              • Opcode Fuzzy Hash: 0d298b0919d4d87294302c951d50e0ecb365de6b4711658db1946db0a2c4a62c
                                                              • Instruction Fuzzy Hash: 8B114FB56006009FC614EB99D9C09ABB3E9EBC8311F10482EF695D7351CB38EC45CBAA
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%