Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gKi3fKq4Kh.exe

Overview

General Information

Sample Name:gKi3fKq4Kh.exe
Analysis ID:651955
MD5:ee24b7367c090788a5d86d24bceb27d2
SHA1:b88a3bf151e935051c6731a42af97b523bf6c2fb
SHA256:484310027c8e469f5154e53c9d3543095410b68730722158848b01d5a842642c
Tags:exenjratRAT
Infos:

Detection

njRat, Xtreme RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Xtreme RAT
Antivirus detection for dropped file
Snort IDS alert for network traffic
Multi AV Scanner detection for submitted file
Detected njRat
Malicious sample detected (through community Yara rule)
Yara detected Njrat
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Found evasive API chain (may stop execution after checking mutex)
Uses netsh to modify the Windows network and firewall settings
Drops PE files to the startup folder
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Installs Xtreme RAT
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Drops executables to the windows directory (C:\Windows) and starts them
Uses dynamic DNS services
Writes to foreign memory regions
Protects its processes via BreakOnTermination flag
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Contains functionality to register a low level keyboard hook
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Modifies the windows firewall
Contains functionality to inject threads in other processes
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Contains long sleeps (>= 3 min)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Checks if the current process is being debugged
Creates a start menu entry (Start Menu\Programs\Startup)
Contains functionality to retrieve information about pressed keystrokes
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Creates files inside the system directory
May infect USB drives
Internet Provider seen in connection with other malware
Found potential string decryption / allocating functions
Contains functionality to call native functions
Contains functionality to read the clipboard data
Contains functionality to upload files via FTP
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Detected TCP or UDP traffic on non-standard ports
Potential key logger detected (key state polling based)
Found evaded block containing many API calls
Monitors certain registry keys / values for changes (often done to protect autostart functionality)

Classification

  • System is w10x64
  • gKi3fKq4Kh.exe (PID: 2576 cmdline: "C:\Users\user\Desktop\gKi3fKq4Kh.exe" MD5: EE24B7367C090788A5D86D24BCEB27D2)
    • svchost.exe (PID: 6456 cmdline: svchost.exe MD5: FA6C268A5B5BDA067A901764D203D433)
      • WerFault.exe (PID: 4056 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 568 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
      • WerFault.exe (PID: 6548 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 576 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • chrome.exe (PID: 3036 cmdline: C:\Program Files\Google\Chrome\Application\chrome.exe MD5: C139654B5C1438A95B321BB01AD63EF6)
    • 794bab1182.exe (PID: 6504 cmdline: "C:\Users\user\AppData\Local\Temp\794bab1182.exe" MD5: 1858BBF45BE50E685409DB249B798996)
      • adobe.exe (PID: 5920 cmdline: "C:\Users\user\AppData\Local\Temp\adobe.exe" MD5: 1858BBF45BE50E685409DB249B798996)
        • netsh.exe (PID: 5152 cmdline: netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\adobe.exe" "adobe.exe" ENABLE MD5: A0AA3322BB46BBFC36AB9DC1DBBBB807)
          • conhost.exe (PID: 6700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • adobe.exe (PID: 5524 cmdline: "C:\Users\user\AppData\Local\Temp\adobe.exe" .. MD5: 1858BBF45BE50E685409DB249B798996)
  • adobe.exe (PID: 4360 cmdline: "C:\Users\user\AppData\Local\Temp\adobe.exe" .. MD5: 1858BBF45BE50E685409DB249B798996)
  • adobe.exe (PID: 2980 cmdline: "C:\Users\user\AppData\Local\Temp\adobe.exe" .. MD5: 1858BBF45BE50E685409DB249B798996)
  • cleanup
{"Host": "babaloo.duckdns.org", "Port": "1182", "Version": "0.7d", "Campaign ID": "Ativado Windows 7", "Install Name": "adobe.exe", "Install Dir": "TEMP", "Network Seprator": "|'|'|"}
{"id": "Server", "group": "Servers", "version": "2.9", "mutex": "wzk5VL6RM0QU9blk", "installdir": "InstallDir", "installdirfile": "Server.exe", "ftp server": "ftp.ftpserver.com"}
SourceRuleDescriptionAuthorStrings
gKi3fKq4Kh.exeRAT_XtremeDetects Xtreme RATKevin Breen <kevin@techanarchy.net>
  • 0x45d8:$a: XTREME
  • 0x9db8:$a: XTREME
  • 0xab70:$a: XTREME
  • 0xf380:$a: XTREME
  • 0xf38e:$a: XTREME
  • 0xbd74:$b: ServerStarted
  • 0x89f0:$c: XtremeKeylogger
  • 0x470c:$d: x.html
  • 0x854a:$e: Xtreme RAT
gKi3fKq4Kh.exeXtreme_Sep17_1Detects XTREME sample analyzed in September 2017Florian Roth
  • 0x5dcd:$x1: ServerKeyloggerU
  • 0x51f69:$x2: TServerKeylogger
  • 0x89f0:$x3: XtremeKeylogger
  • 0xab70:$x4: XTREMEBINDER
  • 0xf38e:$x4: XTREMEBINDER
  • 0xa850:$s1: shellexecute=
  • 0x6d4c:$s2: [Execute]
  • 0xa796:$s3: ;open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
gKi3fKq4Kh.exeJoeSecurity_XtremeRatYara detected Xtreme RATKevin Breen <kevin@techanarchy.net>
    gKi3fKq4Kh.exextremratXtrem RAT v3.5Jean-Philippe Teissier / @Jipe_
    • 0x45d8:$a: XTREME
    • 0x9db8:$a: XTREME
    • 0xab70:$a: XTREME
    • 0xf380:$a: XTREME
    • 0xf38e:$a: XTREME
    • 0xab70:$b: XTREMEBINDER
    • 0xf38e:$b: XTREMEBINDER
    • 0x9dcc:$c: STARTSERVERBUFFER
    • 0xcbb4:$d: SOFTWARE\XtremeRAT
    • 0x89f0:$f: XtremeKeylogger
    • 0x854a:$h: Xtreme RAT
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\adobe.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0x4d46:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0x4e9e:$s3: Executed As
    • 0x4e80:$s6: Download ERROR
    C:\Users\user\AppData\Local\Temp\adobe.exeJoeSecurity_NjratYara detected NjratJoe Security
      C:\Users\user\AppData\Local\Temp\adobe.exeMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
      • 0x4cd8:$s1: netsh firewall delete allowedprogram
      • 0x4db4:$s2: netsh firewall add allowedprogram
      • 0x4d46:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
      • 0x4e5c:$s4: Execute ERROR
      • 0x4eb8:$s4: Execute ERROR
      • 0x4e80:$s5: Download ERROR
      • 0x4fe4:$s6: [kl]
      C:\Users\user\AppData\Local\Temp\adobe.exenjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0x4db4:$a1: netsh firewall add allowedprogram
      • 0x4d84:$a2: SEE_MASK_NOZONECHECKS
      • 0x502e:$b1: [TAP]
      • 0x4d46:$c3: cmd.exe /c ping
      C:\Users\user\AppData\Local\Temp\adobe.exeNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0x4d84:$reg: SEE_MASK_NOZONECHECKS
      • 0x4e5c:$msg: Execute ERROR
      • 0x4eb8:$msg: Execute ERROR
      • 0x4d46:$ping: cmd.exe /c ping 0 -n 2 & del
      Click to see the 10 entries
      SourceRuleDescriptionAuthorStrings
      00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_NjratYara detected NjratJoe Security
        00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
        • 0x4bb4:$a1: netsh firewall add allowedprogram
        • 0x4b84:$a2: SEE_MASK_NOZONECHECKS
        • 0x4e2e:$b1: [TAP]
        • 0x4b46:$c3: cmd.exe /c ping
        00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
        • 0x4b84:$reg: SEE_MASK_NOZONECHECKS
        • 0x4c5c:$msg: Execute ERROR
        • 0x4cb8:$msg: Execute ERROR
        • 0x4b46:$ping: cmd.exe /c ping 0 -n 2 & del
        00000001.00000002.385106851.0000000010047000.00000040.00000400.00020000.00000000.sdmpxtremratXtrem RAT v3.5Jean-Philippe Teissier / @Jipe_
        • 0x1380:$a: XTREME
        • 0x138e:$a: XTREME
        • 0x138e:$b: XTREMEBINDER
        00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_NjratYara detected NjratJoe Security
          Click to see the 73 entries
          SourceRuleDescriptionAuthorStrings
          10.0.adobe.exe.480000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0x4d46:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0x4e9e:$s3: Executed As
          • 0x4e80:$s6: Download ERROR
          10.0.adobe.exe.480000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
            10.0.adobe.exe.480000.0.unpackMALWARE_Win_NjRATDetects NjRAT / BladabindiditekSHen
            • 0x4cd8:$s1: netsh firewall delete allowedprogram
            • 0x4db4:$s2: netsh firewall add allowedprogram
            • 0x4d46:$s3: 63 00 6D 00 64 00 2E 00 65 00 78 00 65 00 20 00 2F 00 63 00 20 00 70 00 69 00 6E 00 67
            • 0x4e5c:$s4: Execute ERROR
            • 0x4eb8:$s4: Execute ERROR
            • 0x4e80:$s5: Download ERROR
            • 0x4fe4:$s6: [kl]
            10.0.adobe.exe.480000.0.unpacknjrat1Identify njRatBrian Wallace @botnet_hunter
            • 0x4db4:$a1: netsh firewall add allowedprogram
            • 0x4d84:$a2: SEE_MASK_NOZONECHECKS
            • 0x502e:$b1: [TAP]
            • 0x4d46:$c3: cmd.exe /c ping
            10.0.adobe.exe.480000.0.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
            • 0x4d84:$reg: SEE_MASK_NOZONECHECKS
            • 0x4e5c:$msg: Execute ERROR
            • 0x4eb8:$msg: Execute ERROR
            • 0x4d46:$ping: cmd.exe /c ping 0 -n 2 & del
            Click to see the 109 entries
            No Sigma rule has matched
            Timestamp:192.168.2.6141.255.147.504977411822814856 06/24/22-17:57:22.268200
            SID:2814856
            Source Port:49774
            Destination Port:1182
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6141.255.147.504977411822033132 06/24/22-17:57:22.048969
            SID:2033132
            Source Port:49774
            Destination Port:1182
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6141.255.147.504977411822825563 06/24/22-17:57:22.268200
            SID:2825563
            Source Port:49774
            Destination Port:1182
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6141.255.147.504977411822814860 06/24/22-17:58:58.665134
            SID:2814860
            Source Port:49774
            Destination Port:1182
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6141.255.147.504977411822825564 06/24/22-17:58:58.665134
            SID:2825564
            Source Port:49774
            Destination Port:1182
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeAvira: detection malicious, Label: TR/Dropper.Gen7
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeAvira: detection malicious, Label: TR/Dropper.Gen7
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeAvira: detection malicious, Label: TR/Dropper.Gen7
            Source: gKi3fKq4Kh.exeMetadefender: Detection: 82%Perma Link
            Source: gKi3fKq4Kh.exeReversingLabs: Detection: 100%
            Source: Yara matchFile source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gKi3fKq4Kh.exe PID: 2576, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 794bab1182.exe PID: 6504, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5920, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 4360, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 2980, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPED
            Source: gKi3fKq4Kh.exeAvira: detected
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeMetadefender: Detection: 91%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeMetadefender: Detection: 91%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeReversingLabs: Detection: 97%
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeMetadefender: Detection: 91%Perma Link
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeReversingLabs: Detection: 97%
            Source: gKi3fKq4Kh.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeJoe Sandbox ML: detected
            Source: 7.0.794bab1182.exe.cf0000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 1.2.svchost.exe.10000000.0.unpackAvira: Label: TR/Agent.ssnsz
            Source: 10.0.adobe.exe.480000.3.unpackAvira: Label: TR/Dropper.Gen7
            Source: 7.2.794bab1182.exe.cf0000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpackAvira: Label: TR/Agent.ssnsz
            Source: 10.0.adobe.exe.480000.1.unpackAvira: Label: TR/Dropper.Gen7
            Source: 10.2.adobe.exe.480000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 20.2.adobe.exe.70000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 10.0.adobe.exe.480000.2.unpackAvira: Label: TR/Dropper.Gen7
            Source: 19.0.adobe.exe.8e0000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpackAvira: Label: TR/Agent.hklh
            Source: 10.0.adobe.exe.480000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 19.2.adobe.exe.8e0000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 23.0.adobe.exe.110000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 23.2.adobe.exe.110000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 20.0.adobe.exe.70000.0.unpackAvira: Label: TR/Dropper.Gen7
            Source: 1.0.svchost.exe.10000000.0.unpackAvira: Label: TR/Agent.ssnsz
            Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Njrat {"Host": "babaloo.duckdns.org", "Port": "1182", "Version": "0.7d", "Campaign ID": "Ativado Windows 7", "Install Name": "adobe.exe", "Install Dir": "TEMP", "Network Seprator": "|'|'|"}
            Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Xtreme RAT {"id": "Server", "group": "Servers", "version": "2.9", "mutex": "wzk5VL6RM0QU9blk", "installdir": "InstallDir", "installdirfile": "Server.exe", "ftp server": "ftp.ftpserver.com"}
            Source: gKi3fKq4Kh.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
            Source: gKi3fKq4Kh.exeBinary or memory string: autorun.inf
            Source: gKi3fKq4Kh.exeBinary or memory string: [autorun] ;open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: gKi3fKq4Kh.exeBinary or memory string: [autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: gKi3fKq4Kh.exe, 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
            Source: gKi3fKq4Kh.exe, 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: autorun.inf
            Source: svchost.exeBinary or memory string: autorun.inf
            Source: svchost.exeBinary or memory string: [autorun] ;open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: svchost.exeBinary or memory string: [autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\
            Source: svchost.exe, 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: svchost.exe, 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: svchost.exe, 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: [autorun]
            Source: svchost.exe, 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: autorun.inf
            Source: gKi3fKq4Kh.exeBinary or memory string: [autorun]
            Source: gKi3fKq4Kh.exeBinary or memory string: autorun.inf
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10005CA4 FindFirstFileW,FindClose,0_2_10005CA4

            Networking

            barindex
            Source: TrafficSnort IDS: 2033132 ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) 192.168.2.6:49774 -> 141.255.147.50:1182
            Source: TrafficSnort IDS: 2814856 ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) 192.168.2.6:49774 -> 141.255.147.50:1182
            Source: TrafficSnort IDS: 2825563 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) 192.168.2.6:49774 -> 141.255.147.50:1182
            Source: TrafficSnort IDS: 2814860 ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) 192.168.2.6:49774 -> 141.255.147.50:1182
            Source: TrafficSnort IDS: 2825564 ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) 192.168.2.6:49774 -> 141.255.147.50:1182
            Source: unknownDNS query: name: babaloo.duckdns.org
            Source: Malware configuration extractorURLs: babaloo.duckdns.org
            Source: Joe Sandbox ViewASN Name: IELOIELOMainNetworkFR IELOIELOMainNetworkFR
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100068EC InternetOpenW,InternetConnectW,FtpSetCurrentDirectoryW,WaitForSingleObject,FtpPutFileW,InternetCloseHandle,InternetCloseHandle,0_2_100068EC
            Source: global trafficTCP traffic: 192.168.2.6:49774 -> 141.255.147.50:1182
            Source: 747MBR Regenerator v4.5.exe, 00000009.00000003.425486975.000000001BE7B000.00000004.00000020.00020000.00000000.sdmp, 747MBR Regenerator v4.5.exe, 00000009.00000003.425474373.000000001BE7A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
            Source: 747MBR Regenerator v4.5.exe, 00000009.00000003.418962747.000000001BE72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: 747MBR Regenerator v4.5.exe, 00000009.00000003.418962747.000000001BE72000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.comicoM
            Source: 747MBR Regenerator v4.5.exe, 00000009.00000003.427520259.000000001BE78000.00000004.00000020.00020000.00000000.sdmp, 747MBR Regenerator v4.5.exe, 00000009.00000003.427620869.000000001BE78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: 747MBR Regenerator v4.5.exe.0.drString found in binary or memory: http://www.smartassembly.com
            Source: 747MBR Regenerator v4.5.exe, 00000009.00000003.435601484.000000001BEB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.de&
            Source: unknownDNS traffic detected: queries for: babaloo.duckdns.org
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10005F86 URLDownloadToCacheFileW,CopyFileW,0_2_10005F86

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: 794bab1182.exe.0.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: adobe.exe.7.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 1f777f760b787dc4d8cfb3fe867defca.exe.10.dr, kl.cs.Net Code: VKCodeToUnicode
            Source: 10.0.adobe.exe.480000.3.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 10.0.adobe.exe.480000.1.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 10.2.adobe.exe.480000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 10.0.adobe.exe.480000.2.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 10.0.adobe.exe.480000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 19.0.adobe.exe.8e0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 19.2.adobe.exe.8e0000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 20.2.adobe.exe.70000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 20.0.adobe.exe.70000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 23.0.adobe.exe.110000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: 23.2.adobe.exe.110000.0.unpack, kl.cs.Net Code: VKCodeToUnicode
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10008568 SetWindowsHookExW 0000000D,10008040,00000000,000000000_2_10008568
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10008040 GetKeyboardState,GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,VirtualAlloc,SendMessageA,CallNextHookEx,0_2_10008040
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100069DC OpenClipboard,GetClipboardData,GlobalFix,GlobalSize,GlobalUnWire,CloseClipboard,0_2_100069DC
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100069DC OpenClipboard,GetClipboardData,GlobalFix,GlobalSize,GlobalUnWire,CloseClipboard,0_2_100069DC
            Source: 794bab1182.exe, 00000007.00000002.415449347.00000000013F8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10006D04 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_10006D04

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gKi3fKq4Kh.exe PID: 2576, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 794bab1182.exe PID: 6504, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5920, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 4360, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 2980, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPED

            Operating System Destruction

            barindex
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: Yara matchFile source: gKi3fKq4Kh.exe, type: SAMPLE
            Source: Yara matchFile source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: gKi3fKq4Kh.exe, type: SAMPLEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: gKi3fKq4Kh.exe, type: SAMPLEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: gKi3fKq4Kh.exe, type: SAMPLEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.385106851.0000000010047000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000000.368594046.0000000010047000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000001.00000000.375422528.0000000010047000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects XTREME sample analyzed in September 2017 Author: Florian Roth
            Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects Xtreme RAT Author: Kevin Breen <kevin@techanarchy.net>
            Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Xtrem RAT v3.5 Author: Jean-Philippe Teissier / @Jipe_
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeKey created: HKEY_CURRENT_USER\SOFTWARE\XtremeRATJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 568
            Source: gKi3fKq4Kh.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
            Source: gKi3fKq4Kh.exe, type: SAMPLEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: gKi3fKq4Kh.exe, type: SAMPLEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: gKi3fKq4Kh.exe, type: SAMPLEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 1.0.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 1.2.svchost.exe.10000000.0.raw.unpack, type: UNPACKEDPEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 1.0.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.2.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 1.2.svchost.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 0.0.gKi3fKq4Kh.exe.10000000.0.unpack, type: UNPACKEDPEMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000001.00000002.385106851.0000000010047000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000000.368594046.0000000010047000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000001.00000000.375422528.0000000010047000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Xtreme_Sep17_1 date = 2017-09-27, hash1 = 93c89044e8850721d39e935acd3fb693de154b7580d62ed460256cabb75599a6, author = Florian Roth, description = Detects XTREME sample analyzed in September 2017, reference = Internal Research, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: RAT_Xtreme date = 01.04.2014, filetype = exe, ver = 2.9, 3.1, 3.2, 3.5, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, description = Detects Xtreme RAT, reference = http://malwareconfig.com/stats/Xtreme
            Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: xtremrat date = 2012-07-12, filetype = memory, author = Jean-Philippe Teissier / @Jipe_, description = Xtrem RAT v3.5, version = 1.0
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
            Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPEDMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeFile created: C:\Windows\747MBR Regenerator v4.5.exe.exeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 100037AC appears 177 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 10003B94 appears 94 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 10003A34 appears 95 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 10006D04 appears 88 times
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: String function: 100037AC appears 177 times
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: String function: 10003B94 appears 94 times
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: String function: 10003A34 appears 95 times
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: String function: 10006D04 appears 88 times
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000649C NtdllDefWindowProc_A,0_2_1000649C
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100064F4 NtdllDefWindowProc_A,0_2_100064F4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000BD14 CreateProcessW,Sleep,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,SetThreadContext,ResumeThread,0_2_1000BD14
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000BD60 CreateProcessW,Sleep,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,SetThreadContext,ResumeThread,0_2_1000BD60
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10008568 VirtualFree,WriteFile,UnhookWindowsHookEx,SetFilePointer,GetFileSize,ReadFile,SetFilePointer,SetFileAttributesW,DeleteFileW,CreateFileW,WriteFile,CloseHandle,GetModuleHandleA,SetWindowsHookExW,UnhookWindowsHookEx,UnhookWindowsHookEx,GetModuleHandleA,SetWindowsHookExW,WriteFile,SetFilePointer,SetEndOfFile,NtdllDefWindowProc_A,0_2_10008568
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000AF50 NtdllDefWindowProc_A,0_2_1000AF50
            Source: gKi3fKq4Kh.exe, 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMBR.exe@ vs gKi3fKq4Kh.exe
            Source: gKi3fKq4Kh.exe, 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMBR.exe@ vs gKi3fKq4Kh.exe
            Source: gKi3fKq4Kh.exe, 00000000.00000003.382966085.00000000026C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMBR.exe@ vs gKi3fKq4Kh.exe
            Source: gKi3fKq4Kh.exe, 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMBR.exe@ vs gKi3fKq4Kh.exe
            Source: gKi3fKq4Kh.exe, 00000000.00000003.387733109.00000000026C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMBR.exe@ vs gKi3fKq4Kh.exe
            Source: gKi3fKq4Kh.exe, 00000000.00000003.383163151.0000000003031000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMBR.exe@ vs gKi3fKq4Kh.exe
            Source: 747MBR Regenerator v4.5.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\794bab1182.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.adwa.spyw.evad.winEXE@19/9@1/1
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100051E8 FindResourceW,SizeofResource,LoadResource,LockResource,FreeResource,0_2_100051E8
            Source: gKi3fKq4Kh.exeMetadefender: Detection: 82%
            Source: gKi3fKq4Kh.exeReversingLabs: Detection: 100%
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\gKi3fKq4Kh.exe "C:\Users\user\Desktop\gKi3fKq4Kh.exe"
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exe
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
            Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 568
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Users\user\AppData\Local\Temp\794bab1182.exe "C:\Users\user\AppData\Local\Temp\794bab1182.exe"
            Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 576
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Windows\747MBR Regenerator v4.5.exe "C:\Windows\747MBR Regenerator v4.5.exe"
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess created: C:\Users\user\AppData\Local\Temp\adobe.exe "C:\Users\user\AppData\Local\Temp\adobe.exe"
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\adobe.exe" "adobe.exe" ENABLE
            Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\adobe.exe "C:\Users\user\AppData\Local\Temp\adobe.exe" ..
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\adobe.exe "C:\Users\user\AppData\Local\Temp\adobe.exe" ..
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\adobe.exe "C:\Users\user\AppData\Local\Temp\adobe.exe" ..
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Users\user\AppData\Local\Temp\794bab1182.exe "C:\Users\user\AppData\Local\Temp\794bab1182.exe" Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Windows\747MBR Regenerator v4.5.exe "C:\Windows\747MBR Regenerator v4.5.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess created: C:\Users\user\AppData\Local\Temp\adobe.exe "C:\Users\user\AppData\Local\Temp\adobe.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\adobe.exe" "adobe.exe" ENABLEJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeFile created: C:\Users\user\AppData\Local\Temp\x.htmlJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dllJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\wzk5VL6RM0QU9blkPERSIST
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMutant created: \Sessions\1\BaseNamedObjects\wzk5VL6RM0QU9blk
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6700:120:WilError_01
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\747MBR Regenerator v4.5.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dllJump to behavior
            Source: gKi3fKq4Kh.exeStatic file information: File size 1556992 > 1048576
            Source: gKi3fKq4Kh.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x16d200

            Data Obfuscation

            barindex
            Source: 794bab1182.exe.0.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 747MBR Regenerator v4.5.exe.0.dr, u0004/u0002.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: adobe.exe.7.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 9.0.747MBR Regenerator v4.5.exe.7b0000.0.unpack, u0004/u0002.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 1f777f760b787dc4d8cfb3fe867defca.exe.10.dr, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 10.0.adobe.exe.480000.3.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 10.0.adobe.exe.480000.1.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 10.2.adobe.exe.480000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 10.0.adobe.exe.480000.2.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 10.0.adobe.exe.480000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 19.0.adobe.exe.8e0000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 19.2.adobe.exe.8e0000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 20.2.adobe.exe.70000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 20.0.adobe.exe.70000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 23.0.adobe.exe.110000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: 23.2.adobe.exe.110000.0.unpack, OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000C038 push 1000C064h; ret 0_2_1000C05C
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000619C push 100061D4h; ret 0_2_100061CC
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100051A0 push 100051CCh; ret 0_2_100051C4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100099C0 push 100099ECh; ret 0_2_100099E4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000A240 push 1000A26Ch; ret 0_2_1000A264
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100052B0 push 100052FCh; ret 0_2_100052F4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10004AF8 push 10004B49h; ret 0_2_10004B41
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000AB30 push 1000AB68h; ret 0_2_1000AB60
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000AB74 push 1000ABA0h; ret 0_2_1000AB98
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10006464 push 10006490h; ret 0_2_10006488
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000BC98 push 1000BD08h; ret 0_2_1000BD00
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000A4A0 push 1000A4D3h; ret 0_2_1000A4CB
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000BCA4 push 1000BD08h; ret 0_2_1000BD00
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000BD14 push 1000BD08h; ret 0_2_1000BD00
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10004D28 push 10004D54h; ret 0_2_10004D4C
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10004D60 push 10004D8Ch; ret 0_2_10004D84
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10006630 push 1000665Ch; ret 0_2_10006654
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000966C push 100096F4h; ret 0_2_100096EC
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000B6C0 push 1000B6ECh; ret 0_2_1000B6E4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100096F6 push 10009781h; ret 0_2_10009779
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100096F8 push 10009781h; ret 0_2_10009779
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000AF90 push 1000AFBCh; ret 0_2_1000AFB4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000AFC8 push 1000AFBCh; ret 0_2_1000AFB4
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000CFE0 push 1000D02Eh; ret 0_2_1000D026
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_1000C038 push 1000C064h; ret 1_2_1000C05C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_1000619C push 100061D4h; ret 1_2_100061CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_100051A0 push 100051CCh; ret 1_2_100051C4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_100099C0 push 100099ECh; ret 1_2_100099E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_1000A240 push 1000A26Ch; ret 1_2_1000A264
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_100052B0 push 100052FCh; ret 1_2_100052F4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_10004AF8 push 10004B49h; ret 1_2_10004B41
            Source: adobe.exe.7.drStatic PE information: real checksum: 0x0 should be: 0x12492
            Source: 1f777f760b787dc4d8cfb3fe867defca.exe.10.drStatic PE information: real checksum: 0x0 should be: 0x12492
            Source: gKi3fKq4Kh.exeStatic PE information: real checksum: 0x5ccb1 should be: 0x17ef59
            Source: 794bab1182.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x12492
            Source: initial sampleStatic PE information: section name: .text entropy: 7.966382769153741

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeExecutable created and started: C:\Windows\747MBR Regenerator v4.5.exeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeFile created: C:\Users\user\AppData\Local\Temp\794bab1182.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeFile created: C:\Users\user\AppData\Local\Temp\adobe.exeJump to dropped file
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeFile created: C:\Windows\747MBR Regenerator v4.5.exeJump to dropped file
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeFile created: C:\Windows\747MBR Regenerator v4.5.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 1f777f760b787dc4d8cfb3fe867defcaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 1f777f760b787dc4d8cfb3fe867defcaJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run 1f777f760b787dc4d8cfb3fe867defcaJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-10958
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-10958
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe TID: 6520Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe TID: 6468Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe TID: 3396Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exe TID: 5444Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-11372
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeWindow / User API: threadDelayed 4548Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeAPI coverage: 8.0 %
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeEvaded block: after key decisiongraph_0-10985
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeAPI call chain: ExitProcess graph end nodegraph_0-10800
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeAPI call chain: ExitProcess graph end nodegraph_0-11099
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeAPI call chain: ExitProcess graph end nodegraph_0-11166
            Source: adobe.exe, 0000000A.00000002.641444169.0000000000AEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllxu
            Source: gKi3fKq4Kh.exeBinary or memory string: jiejwogfdjieovevodnvfnievngsegtsrgrefsfsfsgrsgrttrhgtehgfsgrfgtrwegtrejytjyegrsfvfbgfsdfhgtrfsgfrsgfgregtregtrfrgjbfdkbnfsdjbvofsjfrfreSVWU
            Source: adobe.exe, 0000000A.00000002.641444169.0000000000AEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWe=neutral, Pub
            Source: gKi3fKq4Kh.exe, svchost.exeBinary or memory string: trhgtehgfsgrfgtrwegtre
            Source: netsh.exe, 0000000F.00000002.451857662.0000000000B78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10005CA4 FindFirstFileW,FindClose,0_2_10005CA4
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMemory allocated: C:\Windows\SysWOW64\svchost.exe base: 10000000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMemory allocated: C:\Program Files\Google\Chrome\Application\chrome.exe base: 10000000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 10000000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMemory written: C:\Program Files\Google\Chrome\Application\chrome.exe base: 10000000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_1000BD14 CreateProcessW,Sleep,GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,SetThreadContext,ResumeThread,0_2_1000BD14
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeThread created: C:\Windows\SysWOW64\svchost.exe EIP: 1000C9D0Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 10000000Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeMemory written: C:\Program Files\Google\Chrome\Application\chrome.exe base: 10000000Jump to behavior
            Source: 794bab1182.exe.0.dr, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 794bab1182.exe.0.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: adobe.exe.7.dr, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: adobe.exe.7.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 1f777f760b787dc4d8cfb3fe867defca.exe.10.dr, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 1f777f760b787dc4d8cfb3fe867defca.exe.10.dr, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 10.0.adobe.exe.480000.3.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 10.0.adobe.exe.480000.3.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 10.0.adobe.exe.480000.1.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 10.0.adobe.exe.480000.1.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 10.2.adobe.exe.480000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 10.2.adobe.exe.480000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 10.0.adobe.exe.480000.2.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 10.0.adobe.exe.480000.2.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 10.0.adobe.exe.480000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 10.0.adobe.exe.480000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 19.0.adobe.exe.8e0000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 19.0.adobe.exe.8e0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 19.2.adobe.exe.8e0000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 19.2.adobe.exe.8e0000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 20.2.adobe.exe.70000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 20.2.adobe.exe.70000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 20.0.adobe.exe.70000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 20.0.adobe.exe.70000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 23.0.adobe.exe.110000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 23.0.adobe.exe.110000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: 23.2.adobe.exe.110000.0.unpack, OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
            Source: 23.2.adobe.exe.110000.0.unpack, kl.csReference to suspicious API methods: ('MapVirtualKey', 'MapVirtualKey@user32.dll'), ('GetAsyncKeyState', 'GetAsyncKeyState@user32')
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_100098A8 GetModuleHandleA,VirtualFreeEx,VirtualAllocEx,GetModuleHandleA,WriteProcessMemory,CreateRemoteThread,CloseHandle,0_2_100098A8
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Windows\SysWOW64\svchost.exe svchost.exeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exeJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Users\user\AppData\Local\Temp\794bab1182.exe "C:\Users\user\AppData\Local\Temp\794bab1182.exe" Jump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeProcess created: C:\Windows\747MBR Regenerator v4.5.exe "C:\Windows\747MBR Regenerator v4.5.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\794bab1182.exeProcess created: C:\Users\user\AppData\Local\Temp\adobe.exe "C:\Users\user\AppData\Local\Temp\adobe.exe" Jump to behavior
            Source: adobe.exe, 0000000A.00000002.642162794.0000000002BC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: adobe.exe, 0000000A.00000002.642162794.0000000002BC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager|9Hq
            Source: adobe.exe, 0000000A.00000002.642162794.0000000002BC5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager<
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: GetLocaleInfoA,0_2_10004A84
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\747MBR Regenerator v4.5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10006B14 GetLocalTime,0_2_10006B14
            Source: C:\Users\user\Desktop\gKi3fKq4Kh.exeCode function: 0_2_10004B4D GetCommandLineA,GetVersion,GetVersion,GetThreadLocale,GetThreadLocale,GetCurrentThreadId,0_2_10004B4D

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\adobe.exe" "adobe.exe" ENABLE
            Source: C:\Users\user\AppData\Local\Temp\adobe.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\adobe.exe" "adobe.exe" ENABLE

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gKi3fKq4Kh.exe PID: 2576, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 794bab1182.exe PID: 6504, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5920, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 4360, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 2980, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: 794bab1182.exe.0.dr, OK.cs.Net Code: njRat config detected
            Source: adobe.exe.7.dr, OK.cs.Net Code: njRat config detected
            Source: 7.0.794bab1182.exe.cf0000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 7.2.794bab1182.exe.cf0000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 1f777f760b787dc4d8cfb3fe867defca.exe.10.dr, OK.cs.Net Code: njRat config detected
            Source: 10.0.adobe.exe.480000.3.unpack, OK.cs.Net Code: njRat config detected
            Source: 10.0.adobe.exe.480000.1.unpack, OK.cs.Net Code: njRat config detected
            Source: 10.2.adobe.exe.480000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 10.0.adobe.exe.480000.2.unpack, OK.cs.Net Code: njRat config detected
            Source: 10.0.adobe.exe.480000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 19.0.adobe.exe.8e0000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 19.2.adobe.exe.8e0000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 20.2.adobe.exe.70000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 20.0.adobe.exe.70000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 23.0.adobe.exe.110000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: 23.2.adobe.exe.110000.0.unpack, OK.cs.Net Code: njRat config detected
            Source: Yara matchFile source: 10.0.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.2.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.2.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.0.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.cf0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.0.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.26c8474.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.3.gKi3fKq4Kh.exe.2809474.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 23.2.adobe.exe.110000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 20.0.adobe.exe.70000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 7.2.794bab1182.exe.3367554.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.0.adobe.exe.480000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 19.0.adobe.exe.8e0000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 10.2.adobe.exe.480000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: gKi3fKq4Kh.exe PID: 2576, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: 794bab1182.exe PID: 6504, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5920, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 5524, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 4360, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: adobe.exe PID: 2980, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\adobe.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, type: DROPPED
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, type: DROPPED
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            1
            Replication Through Removable Media
            22
            Native API
            221
            Registry Run Keys / Startup Folder
            612
            Process Injection
            21
            Disable or Modify Tools
            231
            Input Capture
            1
            System Time Discovery
            1
            Replication Through Removable Media
            231
            Input Capture
            1
            Exfiltration Over Alternative Protocol
            1
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts221
            Registry Run Keys / Startup Folder
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Peripheral Device Discovery
            Remote Desktop Protocol2
            Clipboard Data
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
            Remote Access Software
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)13
            Software Packing
            NTDS24
            System Information Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script121
            Masquerading
            LSA Secrets1
            Query Registry
            SSHKeyloggingData Transfer Size Limits211
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common31
            Virtualization/Sandbox Evasion
            Cached Domain Credentials111
            Security Software Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items612
            Process Injection
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem31
            Virtualization/Sandbox Evasion
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
            Application Window Discovery
            Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork Sniffing1
            Remote System Discovery
            Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 651955 Sample: gKi3fKq4Kh.exe Startdate: 24/06/2022 Architecture: WINDOWS Score: 100 54 Snort IDS alert for network traffic 2->54 56 Malicious sample detected (through community Yara rule) 2->56 58 Antivirus detection for dropped file 2->58 60 13 other signatures 2->60 9 gKi3fKq4Kh.exe 3 6 2->9         started        13 adobe.exe 3 2->13         started        15 adobe.exe 2 2->15         started        17 adobe.exe 2 2->17         started        process3 file4 44 C:\Windows\747MBR Regenerator v4.5.exe, PE32 9->44 dropped 46 C:\Users\user\AppData\...\794bab1182.exe, PE32 9->46 dropped 48 C:\Users\user\AppData\...\794bab1182.exe.exe, data 9->48 dropped 68 Found evasive API chain (may stop execution after checking mutex) 9->68 70 Installs Xtreme RAT 9->70 72 Contains functionality to inject threads in other processes 9->72 74 7 other signatures 9->74 19 794bab1182.exe 1 5 9->19         started        23 svchost.exe 9->23         started        25 747MBR Regenerator v4.5.exe 2 9->25         started        27 chrome.exe 9->27         started        signatures5 process6 file7 42 C:\Users\user\AppData\Local\Temp\adobe.exe, PE32 19->42 dropped 62 Antivirus detection for dropped file 19->62 64 Multi AV Scanner detection for dropped file 19->64 66 Machine Learning detection for dropped file 19->66 29 adobe.exe 4 5 19->29         started        34 WerFault.exe 23->34         started        36 WerFault.exe 23->36         started        signatures8 process9 dnsIp10 52 babaloo.duckdns.org 141.255.147.50, 1182, 49774 IELOIELOMainNetworkFR France 29->52 50 C:\...\1f777f760b787dc4d8cfb3fe867defca.exe, PE32 29->50 dropped 76 Antivirus detection for dropped file 29->76 78 Multi AV Scanner detection for dropped file 29->78 80 Protects its processes via BreakOnTermination flag 29->80 82 5 other signatures 29->82 38 netsh.exe 1 3 29->38         started        file11 signatures12 process13 process14 40 conhost.exe 38->40         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            gKi3fKq4Kh.exe83%MetadefenderBrowse
            gKi3fKq4Kh.exe100%ReversingLabsWin32.Backdoor.XtremeRAT
            gKi3fKq4Kh.exe100%AviraTR/Agent.hklh
            gKi3fKq4Kh.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\794bab1182.exe100%AviraTR/Dropper.Gen7
            C:\Users\user\AppData\Local\Temp\adobe.exe100%AviraTR/Dropper.Gen7
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe100%AviraTR/Dropper.Gen7
            C:\Users\user\AppData\Local\Temp\794bab1182.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\adobe.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\794bab1182.exe91%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\794bab1182.exe98%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Local\Temp\adobe.exe91%MetadefenderBrowse
            C:\Users\user\AppData\Local\Temp\adobe.exe98%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe91%MetadefenderBrowse
            C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe98%ReversingLabsByteCode-MSIL.Backdoor.Bladabhindi
            C:\Windows\747MBR Regenerator v4.5.exe9%MetadefenderBrowse
            C:\Windows\747MBR Regenerator v4.5.exe3%ReversingLabs
            SourceDetectionScannerLabelLinkDownload
            7.0.794bab1182.exe.cf0000.0.unpack100%AviraTR/Dropper.Gen7Download File
            1.2.svchost.exe.10000000.0.unpack100%AviraTR/Agent.ssnszDownload File
            10.0.adobe.exe.480000.3.unpack100%AviraTR/Dropper.Gen7Download File
            7.2.794bab1182.exe.cf0000.0.unpack100%AviraTR/Dropper.Gen7Download File
            0.2.gKi3fKq4Kh.exe.10000000.0.unpack100%AviraTR/Agent.ssnszDownload File
            10.0.adobe.exe.480000.1.unpack100%AviraTR/Dropper.Gen7Download File
            10.2.adobe.exe.480000.0.unpack100%AviraTR/Dropper.Gen7Download File
            20.2.adobe.exe.70000.0.unpack100%AviraTR/Dropper.Gen7Download File
            10.0.adobe.exe.480000.2.unpack100%AviraTR/Dropper.Gen7Download File
            19.0.adobe.exe.8e0000.0.unpack100%AviraTR/Dropper.Gen7Download File
            0.0.gKi3fKq4Kh.exe.10000000.0.unpack100%AviraTR/Agent.hklhDownload File
            10.0.adobe.exe.480000.0.unpack100%AviraTR/Dropper.Gen7Download File
            19.2.adobe.exe.8e0000.0.unpack100%AviraTR/Dropper.Gen7Download File
            23.0.adobe.exe.110000.0.unpack100%AviraTR/Dropper.Gen7Download File
            23.2.adobe.exe.110000.0.unpack100%AviraTR/Dropper.Gen7Download File
            20.0.adobe.exe.70000.0.unpack100%AviraTR/Dropper.Gen7Download File
            1.0.svchost.exe.10000000.0.unpack100%AviraTR/Agent.ssnszDownload File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.smartassembly.com0%Avira URL Cloudsafe
            http://www.urwpp.de&0%Avira URL Cloudsafe
            http://www.sajatypeworks.comicoM0%Avira URL Cloudsafe
            http://www.sakkal.com0%URL Reputationsafe
            babaloo.duckdns.org0%Avira URL Cloudsafe
            http://en.w0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            babaloo.duckdns.org
            141.255.147.50
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              babaloo.duckdns.orgtrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.smartassembly.com747MBR Regenerator v4.5.exe.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://www.urwpp.de&747MBR Regenerator v4.5.exe, 00000009.00000003.435601484.000000001BEB5000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://www.sajatypeworks.comicoM747MBR Regenerator v4.5.exe, 00000009.00000003.418962747.000000001BE72000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.sakkal.com747MBR Regenerator v4.5.exe, 00000009.00000003.427520259.000000001BE78000.00000004.00000020.00020000.00000000.sdmp, 747MBR Regenerator v4.5.exe, 00000009.00000003.427620869.000000001BE78000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://en.w747MBR Regenerator v4.5.exe, 00000009.00000003.425486975.000000001BE7B000.00000004.00000020.00020000.00000000.sdmp, 747MBR Regenerator v4.5.exe, 00000009.00000003.425474373.000000001BE7A000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.sajatypeworks.com747MBR Regenerator v4.5.exe, 00000009.00000003.418962747.000000001BE72000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              141.255.147.50
              babaloo.duckdns.orgFrance
              29075IELOIELOMainNetworkFRtrue
              Joe Sandbox Version:35.0.0 Citrine
              Analysis ID:651955
              Start date and time: 24/06/202217:55:312022-06-24 17:55:31 +02:00
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 10m 32s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:gKi3fKq4Kh.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:30
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.troj.adwa.spyw.evad.winEXE@19/9@1/1
              EGA Information:
              • Successful, ratio: 50%
              HDC Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 33
              • Number of non-executed functions: 153
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Adjust boot time
              • Enable AMSI
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 52.152.110.14, 40.125.122.176, 52.242.101.226, 20.223.24.244, 20.54.89.106
              • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cdn.onenote.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
              • Execution Graph export aborted for target svchost.exe, PID 6456 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: gKi3fKq4Kh.exe
              TimeTypeDescription
              17:57:19AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run 1f777f760b787dc4d8cfb3fe867defca "C:\Users\user\AppData\Local\Temp\adobe.exe" ..
              17:57:28AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run 1f777f760b787dc4d8cfb3fe867defca "C:\Users\user\AppData\Local\Temp\adobe.exe" ..
              17:57:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run 1f777f760b787dc4d8cfb3fe867defca "C:\Users\user\AppData\Local\Temp\adobe.exe" ..
              17:57:47AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe
              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              141.255.147.508BB700898B529BC602316E44EE626D47986FD24775D02.exeGet hashmaliciousBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                IELOIELOMainNetworkFR7DABE14897DDFF2206AB44A43F56872FF90E1FB72BD33.exeGet hashmaliciousBrowse
                • 141.255.146.232
                8BB700898B529BC602316E44EE626D47986FD24775D02.exeGet hashmaliciousBrowse
                • 141.255.147.50
                AB0B2472713C5B3B9521D4B725D2721D0FD4207CF2091.exeGet hashmaliciousBrowse
                • 91.109.186.2
                skjuxRGg4H.exeGet hashmaliciousBrowse
                • 91.109.176.11
                C4tqQ3quOlGet hashmaliciousBrowse
                • 91.109.185.217
                FDACD07D5B4337250F82A03192B0BE1AF1DB598307BC1.exeGet hashmaliciousBrowse
                • 141.255.156.1
                EBC0DDB3A6B0DBA07DEFAA837069CE4E340789325BB96.exeGet hashmaliciousBrowse
                • 141.255.147.164
                31E95C001FCDE0FC9D96FCF9DCCCC27445CEDBB22E095.exeGet hashmaliciousBrowse
                • 91.109.182.6
                MAL.pubGet hashmaliciousBrowse
                • 141.255.151.63
                test.exeGet hashmaliciousBrowse
                • 91.109.190.5
                43938BE01F7EB07EA079505CF0B7D739DEB10F1035294.exeGet hashmaliciousBrowse
                • 91.109.190.7
                57s7kpTftV.exeGet hashmaliciousBrowse
                • 91.109.182.4
                NZ0atB7Y7r.exeGet hashmaliciousBrowse
                • 91.109.186.12
                rubix.armGet hashmaliciousBrowse
                • 188.121.243.183
                www.admin.booking.com_extranet_ngmanagebooking.htmlres_id=3949840873pdf.batGet hashmaliciousBrowse
                • 141.255.151.63
                yJa3zrWCsJ.exeGet hashmaliciousBrowse
                • 91.109.178.8
                kuwlX57hcF.exeGet hashmaliciousBrowse
                • 91.109.178.8
                X4ugKhaw5s.exeGet hashmaliciousBrowse
                • 91.109.178.8
                0FE89ED6775AFF2AEEDDE96F4851D85634F4FA801919A.exeGet hashmaliciousBrowse
                • 91.109.186.7
                8FA3B2EB7650AC7FF7DBBEED506E3F17B805D64D69327.exeGet hashmaliciousBrowse
                • 91.109.186.5
                No context
                No context
                Process:C:\Users\user\AppData\Local\Temp\794bab1182.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):525
                Entropy (8bit):5.2874233355119316
                Encrypted:false
                SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0
                MD5:80EFBEC081D7836D240503C4C9465FEC
                SHA1:6AF398E08A359457083727BAF296445030A55AC3
                SHA-256:C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523
                SHA-512:DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3
                Malicious:false
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..
                Process:C:\Users\user\AppData\Local\Temp\adobe.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):525
                Entropy (8bit):5.2874233355119316
                Encrypted:false
                SSDEEP:12:Q3LaJU20NaL10Ug+9Yz9t0U29hJ5g1B0U2ukyrFk7v:MLF20NaL3z2p29hJ5g522r0
                MD5:80EFBEC081D7836D240503C4C9465FEC
                SHA1:6AF398E08A359457083727BAF296445030A55AC3
                SHA-256:C73F730EB5E05D15FAD6BE10AB51FE4D8A80B5E88B89D8BC80CC1DF09ACE1523
                SHA-512:DEC3B1D9403894418AFD4433629CA6476C7BD359963328D17B93283B52EEC18B3725D2F02F0E9A142E705398DDDCE244D53829570E9DE1A87060A7DABFDCE5B3
                Malicious:false
                Preview:1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System\1ffc437de59fb69ba2b865ffdc98ffd1\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\Microsoft.VisualBas#\cd7c74fce2a0eab72cd25cbe4bb61614\Microsoft.VisualBasic.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\54d944b3ca0ea1188d700fbd8089726b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\bd8d59c984c9f5f2695f64341115cdf0\System.Windows.Forms.ni.dll",0..
                Process:C:\Users\user\Desktop\gKi3fKq4Kh.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):24064
                Entropy (8bit):5.528943143377659
                Encrypted:false
                SSDEEP:384:CwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZz1+:hvZiBK1edJRpcnuT
                MD5:1858BBF45BE50E685409DB249B798996
                SHA1:A68B17653E12F9F9A7B740397620172D901F402C
                SHA-256:FF27F45369D6383E728A72923474E1CEF2F983827F105CB53FFFB852A5B9075A
                SHA-512:6B8FF0CEC4E0D79AC68E7D8595B7420EF3DC6D5EF4A458DD49FFB754CFDBA34026EBF60561CB20FDCF00D983AA76D1F0617D9DFE89B932532C8837C34642FA11
                Malicious:true
                Yara Hits:
                • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: Florian Roth
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: Joe Security
                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: ditekSHen
                • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: JPCERT/CC Incident Response Group
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: Metadefender, Detection: 91%, Browse
                • Antivirus: ReversingLabs, Detection: 98%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.`.................V...........t... ........@.. ....................................@.................................Ht..S.......@............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...@............X..............@..@.reloc...............\..............@..B.................t......H.......,K...)....../....................................................0..........r...p.....r3..p...........r=..p.....rQ..p.....r[..p.....r...p.....r...p.....r...p.....r...p(.........r...p(.........r...p(.........r...p(.........(....o....s.........s.....................r...p...........s......... ..............rA..p...........*...0..;.......~....o....o....rC..p~....(.....o.....o......%(.....(......*.........,,.......0..D.......~....o....o....rC..p~....(....o......(....o.....
                Process:C:\Users\user\Desktop\gKi3fKq4Kh.exe
                File Type:data
                Category:dropped
                Size (bytes):4
                Entropy (8bit):1.5
                Encrypted:false
                SSDEEP:3:j:j
                MD5:A2CE4C7B743725199DA04033B5B57469
                SHA1:1AE348EAFA097AB898941EAFE912D711A407DA10
                SHA-256:0FFF86057DCFB3975C8BC44459740BA5FFB43551931163538DF3F39A6BB991BC
                SHA-512:23BD59F57B16CD496B550C1BBA09EB3F9A9DFE764EA03470E3CC43E4D0B4CA415D239772E4A9B930749E88CEAD9A7EC4B0A77D0DD310E61D8C6521AE6FF278B0
                Malicious:true
                Preview:O.K.
                Process:C:\Users\user\AppData\Local\Temp\794bab1182.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):24064
                Entropy (8bit):5.528943143377659
                Encrypted:false
                SSDEEP:384:CwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZz1+:hvZiBK1edJRpcnuT
                MD5:1858BBF45BE50E685409DB249B798996
                SHA1:A68B17653E12F9F9A7B740397620172D901F402C
                SHA-256:FF27F45369D6383E728A72923474E1CEF2F983827F105CB53FFFB852A5B9075A
                SHA-512:6B8FF0CEC4E0D79AC68E7D8595B7420EF3DC6D5EF4A458DD49FFB754CFDBA34026EBF60561CB20FDCF00D983AA76D1F0617D9DFE89B932532C8837C34642FA11
                Malicious:true
                Yara Hits:
                • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: Florian Roth
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: Joe Security
                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: ditekSHen
                • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: JPCERT/CC Incident Response Group
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: Metadefender, Detection: 91%, Browse
                • Antivirus: ReversingLabs, Detection: 98%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.`.................V...........t... ........@.. ....................................@.................................Ht..S.......@............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...@............X..............@..@.reloc...............\..............@..B.................t......H.......,K...)....../....................................................0..........r...p.....r3..p...........r=..p.....rQ..p.....r[..p.....r...p.....r...p.....r...p.....r...p(.........r...p(.........r...p(.........r...p(.........(....o....s.........s.....................r...p...........s......... ..............rA..p...........*...0..;.......~....o....o....rC..p~....(.....o.....o......%(.....(......*.........,,.......0..D.......~....o....o....rC..p~....(....o......(....o.....
                Process:C:\Users\user\AppData\Local\Temp\adobe.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):24064
                Entropy (8bit):5.528943143377659
                Encrypted:false
                SSDEEP:384:CwTSiYWD2Z7w3CsJeiecwJ3fw6FgzeAh33RtmRvR6JZlbw8hqIusZzZz1+:hvZiBK1edJRpcnuT
                MD5:1858BBF45BE50E685409DB249B798996
                SHA1:A68B17653E12F9F9A7B740397620172D901F402C
                SHA-256:FF27F45369D6383E728A72923474E1CEF2F983827F105CB53FFFB852A5B9075A
                SHA-512:6B8FF0CEC4E0D79AC68E7D8595B7420EF3DC6D5EF4A458DD49FFB754CFDBA34026EBF60561CB20FDCF00D983AA76D1F0617D9DFE89B932532C8837C34642FA11
                Malicious:true
                Yara Hits:
                • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, Author: Florian Roth
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, Author: Joe Security
                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, Author: ditekSHen
                • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1f777f760b787dc4d8cfb3fe867defca.exe, Author: JPCERT/CC Incident Response Group
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: Metadefender, Detection: 91%, Browse
                • Antivirus: ReversingLabs, Detection: 98%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Q.`.................V...........t... ........@.. ....................................@.................................Ht..S.......@............................................................................ ............... ..H............text....T... ...V.................. ..`.rsrc...@............X..............@..@.reloc...............\..............@..B.................t......H.......,K...)....../....................................................0..........r...p.....r3..p...........r=..p.....rQ..p.....r[..p.....r...p.....r...p.....r...p.....r...p(.........r...p(.........r...p(.........r...p(.........(....o....s.........s.....................r...p...........s......... ..............rA..p...........*...0..;.......~....o....o....rC..p~....(.....o.....o......%(.....(......*.........,,.......0..D.......~....o....o....rC..p~....(....o......(....o.....
                Process:C:\Users\user\Desktop\gKi3fKq4Kh.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):1189376
                Entropy (8bit):7.6880978588181685
                Encrypted:false
                SSDEEP:24576:VTRqE2rb1UKApqrqI9PGi0gf0zQn8qqROJH40UdSX4ovytII6:VTr0b13ApqrqI9PORO8qLYN3UI6
                MD5:FCA2AA6D8039DD107AFF1A3CFBE97F7B
                SHA1:7D47EB1EC59C3381CED53AF2AFE4A5C14CDF86F5
                SHA-256:78729C8E1D3DCC6C70445016E36EB07D79D87033EB124598363038B7D001769F
                SHA-512:F3CCCE78945455536AC6F077EA15B49A73F560043DCF47A054F749E389DF2E9B8FBAB7AC5008E0971B7B8489D359FE2E9F96BC54ED57CFAA94B703CFC3D148BE
                Malicious:true
                Antivirus:
                • Antivirus: Metadefender, Detection: 9%, Browse
                • Antivirus: ReversingLabs, Detection: 3%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......N....................."...........@... ....@.. ....................................@.....................................X.... ..8....................`..........................................................................H............rsrc...8.... ... ..................@..@.text...p....@.......".............. ..`.reloc.......`.......$..............@..B....................................0.......h...............................................................................................(.......................@.......................X.......................p...........................................................................................................................................................................@&..(...........h...................(B..........8....%...........*...............;..L............!..L............;..]...
                Process:C:\Users\user\Desktop\gKi3fKq4Kh.exe
                File Type:data
                Category:dropped
                Size (bytes):4
                Entropy (8bit):1.5
                Encrypted:false
                SSDEEP:3:j:j
                MD5:A2CE4C7B743725199DA04033B5B57469
                SHA1:1AE348EAFA097AB898941EAFE912D711A407DA10
                SHA-256:0FFF86057DCFB3975C8BC44459740BA5FFB43551931163538DF3F39A6BB991BC
                SHA-512:23BD59F57B16CD496B550C1BBA09EB3F9A9DFE764EA03470E3CC43E4D0B4CA415D239772E4A9B930749E88CEAD9A7EC4B0A77D0DD310E61D8C6521AE6FF278B0
                Malicious:false
                Preview:O.K.
                Process:C:\Windows\SysWOW64\netsh.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):313
                Entropy (8bit):4.971939296804078
                Encrypted:false
                SSDEEP:6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha
                MD5:689E2126A85BF55121488295EE068FA1
                SHA1:09BAAA253A49D80C18326DFBCA106551EBF22DD6
                SHA-256:D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25
                SHA-512:C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C
                Malicious:false
                Preview:..IMPORTANT: Command executed successfully...However, "netsh firewall" is deprecated;..use "netsh advfirewall firewall" instead...For more information on using "netsh advfirewall firewall" commands..instead of "netsh firewall", see KB article 947709..at https://go.microsoft.com/fwlink/?linkid=121488 .....Ok.....
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.536751075410278
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:gKi3fKq4Kh.exe
                File size:1556992
                MD5:ee24b7367c090788a5d86d24bceb27d2
                SHA1:b88a3bf151e935051c6731a42af97b523bf6c2fb
                SHA256:484310027c8e469f5154e53c9d3543095410b68730722158848b01d5a842642c
                SHA512:51756aca07c2330607906f9f68b696344531f6244c23fc8de26ae12ebb9610c8954cf9f2a8a3be5d0d77fe13f4681623d06cbf1351f285099a47b17bfa072929
                SSDEEP:24576:xDBDlQkQvALBxR01QpSO2BrrE11MXL/3ButMGmXp3Z8DED2LE1:xDBDcAu1QpSOH11QLvc2Gm53CED2o1
                TLSH:99751250B644C8FBC86506B49C16D07015BABDAA69A1994D7DF23F0F7CB239320EBE07
                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                Icon Hash:14f2d1f0dc7c3045
                Entrypoint:0x1000d0f4
                Entrypoint Section:CODE
                Digitally signed:false
                Imagebase:0x10000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                DLL Characteristics:
                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:d98325588570403f283a229c660142db
                Instruction
                push ebp
                mov ebp, esp
                mov ecx, 000002BCh
                push 00000000h
                push 00000000h
                dec ecx
                jne 00007FF7B18A40BBh
                push ebx
                push esi
                push edi
                mov eax, 1000D030h
                call 00007FF7B189BC99h
                mov edi, 1000F834h
                xor eax, eax
                push ebp
                push 1000D759h
                push dword ptr fs:[eax]
                mov dword ptr fs:[eax], esp
                mov eax, 1000D0D0h
                call 00007FF7B1899FBCh
                mov eax, dword ptr [1000E134h]
                mov byte ptr [eax], 00000001h
                push 00008007h
                call 00007FF7B189BEA6h
                lea edx, dword ptr [ebp-14h]
                mov eax, 00000001h
                call 00007FF7B189C8CDh
                mov eax, dword ptr [ebp-14h]
                mov edx, 1000D76Ch
                call 00007FF7B189A9A0h
                jne 00007FF7B18A40FDh
                lea edx, dword ptr [ebp-18h]
                xor eax, eax
                call 00007FF7B189C8B4h
                mov edx, dword ptr [ebp-18h]
                mov eax, 10012580h
                call 00007FF7B189A6FFh
                push 00000000h
                push 00000000h
                push 00000000h
                mov eax, dword ptr [10012580h]
                call 00007FF7B189A84Fh
                push eax
                push 1000D77Ch
                push 00000000h
                call 00007FF7B18A262Eh
                push 00000000h
                call 00007FF7B189BD67h
                lea edx, dword ptr [ebp-1Ch]
                mov eax, 00000001h
                call 00007FF7B189C876h
                mov eax, dword ptr [ebp-1Ch]
                mov edx, 1000D78Ch
                call 00007FF7B189A949h
                jne 00007FF7B18A40CCh
                push 00001770h
                call 00007FF7B189BE61h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x440000xf9e.idata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x16d044.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x470000xc5c.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x460000x18.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                CODE0x10000xc8280xca00False0.5406675433168316data6.246857924236235IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                DATA0xe0000x1380x200False0.37109375data2.6875021606861305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                BSS0xf0000x342d90x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .idata0x440000xf9e0x1000False0.39404296875data4.698355445739603IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .tls0x450000x80x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rdata0x460000x180x200False0.052734375data0.2491299020576082IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                .reloc0x470000xc5c0xe00False0.7179129464285714data6.264900000779177IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                .rsrc0x480000x16d0440x16d200False0.8587578365713797data7.561175819870481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x483d40x10828dBase III DBT, version number 0, next free block index 40
                RT_ICON0x58bfc0x94a8dBase III DBT, version number 0, next free block index 40
                RT_ICON0x620a40x4228dBase III DBT, version number 0, next free block index 40
                RT_ICON0x662cc0x25a8dBase III DBT, version number 0, next free block index 40
                RT_ICON0x688740x10a8dBase III DBT, version number 0, next free block index 40
                RT_ICON0x6991c0x10828dBase III DBT, version number 0, next free block index 40
                RT_ICON0x7a1440x94a8dBase III DBT, version number 0, next free block index 40
                RT_ICON0x835ec0x4228dBase III DBT, version number 0, next free block index 40
                RT_ICON0x878140x25a8dBase III DBT, version number 0, next free block index 40
                RT_ICON0x89dbc0x10a8dBase III DBT, version number 0, next free block index 40
                RT_RCDATA0x8ae640x10data
                RT_RCDATA0x8ae740x108data
                RT_RCDATA0x8af7c0x1390data
                RT_RCDATA0x8c30c0x128ca0data
                RT_GROUP_ICON0x1b4fac0x4cdata
                RT_GROUP_ICON0x1b4ff80x4cdata
                DLLImport
                kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, WideCharToMultiByte, MultiByteToWideChar, GetThreadLocale, GetStartupInfoA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                user32.dllGetKeyboardType, MessageBoxA
                advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                advapi32.dllRegSetValueExW, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyW, RegCloseKey
                kernel32.dlllstrlenW, WriteProcessMemory, WriteFile, WaitForSingleObject, VirtualProtectEx, VirtualFreeEx, VirtualFree, VirtualAllocEx, VirtualAlloc, TerminateThread, TerminateProcess, Sleep, SizeofResource, SetThreadPriority, SetThreadContext, SetFilePointer, SetFileAttributesW, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ReadProcessMemory, ReadFile, LockResource, LoadResource, LoadLibraryA, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalLock, GetWindowsDirectoryW, GetThreadContext, GetTempPathW, GetSystemDirectoryW, GetModuleHandleA, GetModuleFileNameW, GetLocalTime, GetLastError, GetFileSize, GetFileAttributesW, GetCommandLineW, FreeResource, InterlockedIncrement, InterlockedDecrement, FindResourceW, FindFirstFileW, FindClose, ExitProcess, DeleteFileW, DeleteCriticalSection, CreateThread, CreateRemoteThread, CreateProcessW, CreateMutexW, CreateFileW, CreateEventA, CreateDirectoryW, CopyFileW, CloseHandle
                user32.dllCreateWindowExW, CreateWindowExA, UnregisterClassW, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, ShowWindow, SetWindowsHookExW, SetWindowLongA, SetClipboardViewer, SendMessageA, RegisterWindowMessageW, RegisterClassW, RegisterClassA, PostMessageA, PeekMessageA, OpenClipboard, MapVirtualKeyW, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowLongA, GetMessageA, GetKeyboardLayout, GetKeyState, GetForegroundWindow, GetDesktopWindow, GetClipboardData, GetClassInfoA, DispatchMessageA, DestroyWindow, DefWindowProcA, CloseClipboard, CharUpperW, CharNextW, CharLowerW, CallNextHookEx
                shlwapi.dllSHDeleteKeyW
                shell32.dllSHGetPathFromIDListW, SHGetSpecialFolderLocation, SHGetMalloc, FindExecutableW
                URLMON.DLLURLDownloadToCacheFileW
                wininet.dllInternetCloseHandle, FtpPutFileW, FtpSetCurrentDirectoryW, InternetOpenW, InternetConnectW
                user32.dllGetKeyboardState, ToUnicodeEx
                shell32.dllShellExecuteW
                ntdll.dllNtUnmapViewOfSection
                shlwapi.dllSHDeleteValueW, SHDeleteKeyW
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                192.168.2.6141.255.147.504977411822814856 06/24/22-17:57:22.268200TCP2814856ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf)497741182192.168.2.6141.255.147.50
                192.168.2.6141.255.147.504977411822033132 06/24/22-17:57:22.048969TCP2033132ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll)497741182192.168.2.6141.255.147.50
                192.168.2.6141.255.147.504977411822825563 06/24/22-17:57:22.268200TCP2825563ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf)497741182192.168.2.6141.255.147.50
                192.168.2.6141.255.147.504977411822814860 06/24/22-17:58:58.665134TCP2814860ETPRO TROJAN njRAT/Bladabindi CnC Callback (act)497741182192.168.2.6141.255.147.50
                192.168.2.6141.255.147.504977411822825564 06/24/22-17:58:58.665134TCP2825564ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act)497741182192.168.2.6141.255.147.50
                TimestampSource PortDest PortSource IPDest IP
                Jun 24, 2022 17:57:21.339171886 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:21.504998922 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:21.505120039 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:22.048969030 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:22.268106937 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:22.268199921 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:22.477569103 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:27.128601074 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:27.337821960 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:27.697654963 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:27.701221943 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:27.932090998 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:45.717359066 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:57:45.718348026 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:57:45.927191019 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:03.740978956 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:03.744545937 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:03.970599890 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:21.812078953 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:21.812890053 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:22.032814026 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:39.834538937 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:39.842678070 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:40.059125900 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:42.035995007 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:42.253650904 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:50.539097071 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:50.758990049 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:57.891163111 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:57.891724110 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:58.105972052 CEST118249774141.255.147.50192.168.2.6
                Jun 24, 2022 17:58:58.665133953 CEST497741182192.168.2.6141.255.147.50
                Jun 24, 2022 17:58:58.936659098 CEST118249774141.255.147.50192.168.2.6
                TimestampSource PortDest PortSource IPDest IP
                Jun 24, 2022 17:57:21.227395058 CEST6035053192.168.2.68.8.8.8
                Jun 24, 2022 17:57:21.333596945 CEST53603508.8.8.8192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Jun 24, 2022 17:57:21.227395058 CEST192.168.2.68.8.8.80x1d82Standard query (0)babaloo.duckdns.orgA (IP address)IN (0x0001)
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                Jun 24, 2022 17:57:21.333596945 CEST8.8.8.8192.168.2.60x1d82No error (0)babaloo.duckdns.org141.255.147.50A (IP address)IN (0x0001)

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:17:56:42
                Start date:24/06/2022
                Path:C:\Users\user\Desktop\gKi3fKq4Kh.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\gKi3fKq4Kh.exe"
                Imagebase:0x10000000
                File size:1556992 bytes
                MD5 hash:EE24B7367C090788A5D86D24BCEB27D2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000003.387263414.0000000002809000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000002.389161206.00000000004FA000.00000004.00000020.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: RAT_Xtreme, Description: Detects Xtreme RAT, Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: JoeSecurity_XtremeRat, Description: Yara detected Xtreme RAT, Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000003.377265205.00000000026C8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000000.00000000.368594046.0000000010047000.00000002.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000000.00000003.377615498.0000000002949000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: RAT_Xtreme, Description: Detects Xtreme RAT, Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: JoeSecurity_XtremeRat, Description: Yara detected Xtreme RAT, Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000000.00000000.368576082.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                Reputation:low

                Target ID:1
                Start time:17:56:45
                Start date:24/06/2022
                Path:C:\Windows\SysWOW64\svchost.exe
                Wow64 process (32bit):true
                Commandline:svchost.exe
                Imagebase:0x80000
                File size:44520 bytes
                MD5 hash:FA6C268A5B5BDA067A901764D203D433
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000001.00000002.385106851.0000000010047000.00000040.00000400.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000001.00000000.375422528.0000000010047000.00000040.00000400.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: RAT_Xtreme, Description: Detects Xtreme RAT, Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Xtreme_Sep17_1, Description: Detects XTREME sample analyzed in September 2017, Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_XtremeRat, Description: Yara detected Xtreme RAT, Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                • Rule: RAT_Xtreme, Description: Detects Xtreme RAT, Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: Xtreme_Sep17_1, Description: Detects XTREME sample analyzed in September 2017, Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Florian Roth
                • Rule: JoeSecurity_XtremeRat, Description: Yara detected Xtreme RAT, Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
                • Rule: xtremrat, Description: Xtrem RAT v3.5, Source: 00000001.00000000.375372033.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Author: Jean-Philippe Teissier / @Jipe_
                Reputation:high

                Target ID:2
                Start time:17:56:46
                Start date:24/06/2022
                Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                Wow64 process (32bit):
                Commandline:C:\Program Files\Google\Chrome\Application\chrome.exe
                Imagebase:
                File size:2150896 bytes
                MD5 hash:C139654B5C1438A95B321BB01AD63EF6
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:5
                Start time:17:56:48
                Start date:24/06/2022
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 568
                Imagebase:0xc20000
                File size:434592 bytes
                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:7
                Start time:17:56:49
                Start date:24/06/2022
                Path:C:\Users\user\AppData\Local\Temp\794bab1182.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\794bab1182.exe"
                Imagebase:0xcf0000
                File size:24064 bytes
                MD5 hash:1858BBF45BE50E685409DB249B798996
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000007.00000002.414543592.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000007.00000002.415926103.0000000003365000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000007.00000000.382812726.0000000000CF2000.00000002.00000001.01000000.00000006.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: Florian Roth
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: Joe Security
                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: ditekSHen
                • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\794bab1182.exe, Author: JPCERT/CC Incident Response Group
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 91%, Metadefender, Browse
                • Detection: 98%, ReversingLabs
                Reputation:low

                Target ID:8
                Start time:17:56:49
                Start date:24/06/2022
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6456 -s 576
                Imagebase:0xc20000
                File size:434592 bytes
                MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:9
                Start time:17:56:51
                Start date:24/06/2022
                Path:C:\Windows\747MBR Regenerator v4.5.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\747MBR Regenerator v4.5.exe"
                Imagebase:0x7b0000
                File size:1189376 bytes
                MD5 hash:FCA2AA6D8039DD107AFF1A3CFBE97F7B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Antivirus matches:
                • Detection: 9%, Metadefender, Browse
                • Detection: 3%, ReversingLabs
                Reputation:low

                Target ID:10
                Start time:17:57:02
                Start date:24/06/2022
                Path:C:\Users\user\AppData\Local\Temp\adobe.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\adobe.exe"
                Imagebase:0x480000
                File size:24064 bytes
                MD5 hash:1858BBF45BE50E685409DB249B798996
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000A.00000002.640869740.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000A.00000000.412306049.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000A.00000000.413119228.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: njrat1, Description: Identify njRat, Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000A.00000000.412702627.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 0000000A.00000000.412039638.0000000000482000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: CN_disclosed_20180208_c, Description: Detects malware from disclosed CN malware set, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: Florian Roth
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: Joe Security
                • Rule: MALWARE_Win_NjRAT, Description: Detects NjRAT / Bladabindi, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: ditekSHen
                • Rule: njrat1, Description: Identify njRat, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: C:\Users\user\AppData\Local\Temp\adobe.exe, Author: JPCERT/CC Incident Response Group
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                • Detection: 91%, Metadefender, Browse
                • Detection: 98%, ReversingLabs
                Reputation:low

                Target ID:15
                Start time:17:57:11
                Start date:24/06/2022
                Path:C:\Windows\SysWOW64\netsh.exe
                Wow64 process (32bit):true
                Commandline:netsh firewall add allowedprogram "C:\Users\user\AppData\Local\Temp\adobe.exe" "adobe.exe" ENABLE
                Imagebase:0x12b0000
                File size:82944 bytes
                MD5 hash:A0AA3322BB46BBFC36AB9DC1DBBBB807
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:16
                Start time:17:57:11
                Start date:24/06/2022
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6406f0000
                File size:625664 bytes
                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Target ID:19
                Start time:17:57:28
                Start date:24/06/2022
                Path:C:\Users\user\AppData\Local\Temp\adobe.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\adobe.exe" ..
                Imagebase:0x8e0000
                File size:24064 bytes
                MD5 hash:1858BBF45BE50E685409DB249B798996
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000013.00000000.466457674.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000013.00000002.479265241.00000000008E2000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                Target ID:20
                Start time:17:57:37
                Start date:24/06/2022
                Path:C:\Users\user\AppData\Local\Temp\adobe.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\adobe.exe" ..
                Imagebase:0x70000
                File size:24064 bytes
                MD5 hash:1858BBF45BE50E685409DB249B798996
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000014.00000002.501246127.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000014.00000000.488787385.0000000000072000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                Target ID:23
                Start time:17:57:47
                Start date:24/06/2022
                Path:C:\Users\user\AppData\Local\Temp\adobe.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\adobe.exe" ..
                Imagebase:0x110000
                File size:24064 bytes
                MD5 hash:1858BBF45BE50E685409DB249B798996
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Yara matches:
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000017.00000000.506871291.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                • Rule: njrat1, Description: Identify njRat, Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, Author: Brian Wallace @botnet_hunter
                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000017.00000002.519357389.0000000000112000.00000002.00000001.01000000.0000000A.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                Reset < >

                  Execution Graph

                  Execution Coverage:7%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:4.8%
                  Total number of Nodes:1193
                  Total number of Limit Nodes:14
                  execution_graph 10728 1000d0f4 10729 1000d0fc 10728->10729 10729->10729 10860 10004ce4 GetModuleHandleA 10729->10860 10731 1000d110 10862 10003024 10731->10862 10735 1000d14c 10736 1000d196 10735->10736 10737 1000d15b 10735->10737 10738 10005954 19 API calls 10736->10738 10739 10005954 19 API calls 10737->10739 10740 1000d1a3 10738->10740 10741 1000d165 10739->10741 10744 1000d1b2 Sleep 10740->10744 10745 1000d1bc 10740->10745 10742 100037ac 3 API calls 10741->10742 10743 1000d172 10742->10743 10746 1000d182 ShellExecuteW ExitProcess 10743->10746 10744->10745 10876 100051e8 10745->10876 10750 1000d1f3 10888 10006234 10750->10888 10754 1000d22e 10755 100037ac 3 API calls 10754->10755 10756 1000d271 10755->10756 10757 1000d27b SHDeleteKeyW 10756->10757 10907 100038e0 10757->10907 10759 1000d29b 10917 1000577c 10759->10917 10764 100038e0 4 API calls 10765 1000d2d8 10764->10765 10937 10003928 10765->10937 10767 1000d2e8 10943 10005690 10767->10943 10770 1000d35a 10773 10005664 3 API calls 10770->10773 10771 1000d2fc 10772 10005664 3 API calls 10771->10772 10774 1000d307 10772->10774 10775 1000d365 10773->10775 10776 100038e0 4 API calls 10774->10776 10777 100038e0 4 API calls 10775->10777 10778 1000d31d 10776->10778 10779 1000d37b 10777->10779 10780 100038e0 4 API calls 10778->10780 10781 100038e0 4 API calls 10779->10781 10782 1000d33e 10780->10782 10783 1000d39d 10781->10783 11005 100039ec 10782->11005 10784 100039ec 3 API calls 10783->10784 10786 1000d358 10784->10786 10955 10005ca4 FindFirstFileW 10786->10955 10788 1000d3ca 10789 1000d3d2 SetFileAttributesW 10788->10789 10790 1000d483 10788->10790 11011 1000cf04 10789->11011 10792 1000d493 SetFileAttributesW DeleteFileW 10790->10792 10793 1000d53a 10790->10793 10796 1000d4b0 10792->10796 10958 10004df0 CreateMutexW 10793->10958 10799 100051e8 5 API calls 10796->10799 10797 1000d54a GetLastError 10800 1000d558 ExitProcess 10797->10800 10801 1000d55f CloseHandle 10797->10801 10803 1000d4bd 10799->10803 10804 1000d5d8 GetModuleFileNameW 10801->10804 10805 1000d56e 10801->10805 10802 1000d3ff 10810 10003be4 3 API calls 10802->10810 10806 10003be4 3 API calls 10803->10806 10807 100038e0 4 API calls 10804->10807 10959 10004df0 CreateMutexW 10805->10959 10813 1000d4db 10806->10813 10815 1000d5ff 10807->10815 10809 1000d57e GetLastError 10811 1000d5d2 CloseHandle 10809->10811 10812 1000d58c CloseHandle 10809->10812 10816 1000d420 10810->10816 10811->10804 10822 1000d59c 10812->10822 10818 10006234 5 API calls 10813->10818 10814 1000d612 10819 1000d69a 10814->10819 10820 1000d6ad 10814->10820 10815->10814 10817 100038e0 4 API calls 10815->10817 10824 10006234 5 API calls 10816->10824 10821 1000d62c 10817->10821 10825 1000d506 10818->10825 10826 1000b78c 54 API calls 10819->10826 10833 1000d6c4 TerminateProcess 10820->10833 10839 1000d6fb 10820->10839 10963 100098a8 GetModuleHandleA VirtualFreeEx VirtualAllocEx 10820->10963 10830 1000d66e 10821->10830 10831 1000d63f 10821->10831 11023 10009950 10822->11023 10827 1000d44f 10824->10827 10828 100037ac 3 API calls 10825->10828 10829 1000d6a1 10826->10829 10834 100037ac 3 API calls 10827->10834 10850 1000d516 10828->10850 11028 1000c080 10829->11028 10848 10009950 2 API calls 10830->10848 10960 100054c4 GetTempPathW 10831->10960 10838 10009950 2 API calls 10833->10838 10851 1000d45f 10834->10851 10844 1000d6dc Sleep 10838->10844 10967 1000b78c 10839->10967 10841 1000d71e 11191 10003788 10841->11191 10842 1000d64a 10846 10009950 2 API calls 10842->10846 10843 100098a8 7 API calls 10847 1000d5d0 10843->10847 10844->10820 10846->10814 10847->10804 10848->10814 10850->10793 10851->10790 10852 1000d706 TerminateProcess 10855 1000c080 128 API calls 10852->10855 10855->10841 10856 10003788 SysFreeString 10857 1000d74b 10856->10857 10858 10003788 SysFreeString 10857->10858 10859 1000d758 10858->10859 10861 10004d17 10860->10861 10861->10731 10863 1000302b 10862->10863 10864 100037ac 3 API calls 10863->10864 10865 1000303b SetErrorMode 10863->10865 10864->10863 10866 10005954 10865->10866 11195 10003770 10866->11195 10869 1000596c GetModuleFileNameW 10871 100038e0 4 API calls 10869->10871 10870 1000598d GetCommandLineW 10875 10005994 10870->10875 10872 1000598b 10871->10872 10874 100059b1 10872->10874 10874->10735 10875->10874 11198 10005838 10875->11198 10877 100051f1 10876->10877 10878 100051f6 FindResourceW SizeofResource LoadResource LockResource 10876->10878 10877->10878 10879 1000523c 10878->10879 10880 1000522c 10878->10880 10882 10003be4 10879->10882 10881 10005236 FreeResource 10880->10881 10881->10879 10883 10003bf1 10882->10883 10887 10003bf8 10882->10887 11217 10003748 10883->11217 11214 10003760 10887->11214 11223 10003c28 10888->11223 10891 10003c28 SysAllocStringLen 10892 10006262 10891->10892 11227 10006404 10892->11227 10894 10006283 10895 10003788 SysFreeString 10894->10895 10896 100062a0 10895->10896 10897 100037ac 10896->10897 10898 10003770 10897->10898 10899 100037b4 10897->10899 10901 10003784 10898->10901 10902 10003776 SysFreeString 10898->10902 10899->10898 10900 100037bf SysReAllocStringLen 10899->10900 10903 10003740 10900->10903 10904 100037cf 10900->10904 10901->10754 10902->10901 10905 10003c44 10903->10905 10906 10003c2e SysAllocStringLen 10903->10906 10904->10754 10905->10754 10906->10903 10906->10905 10908 10003864 10907->10908 10909 10003770 10908->10909 10910 1000386c SysAllocStringLen 10908->10910 10913 10003784 10909->10913 10914 10003776 SysFreeString 10909->10914 10911 10003740 10910->10911 10912 1000387c SysFreeString 10910->10912 10915 10003c44 10911->10915 10916 10003c2e SysAllocStringLen 10911->10916 10912->10759 10913->10759 10914->10913 10915->10759 10916->10911 10916->10915 10918 10003c28 SysAllocStringLen 10917->10918 10919 10005794 10918->10919 10920 10003c28 SysAllocStringLen 10919->10920 10921 1000579c 10920->10921 10922 10003c28 SysAllocStringLen 10921->10922 10923 100057a4 10922->10923 10924 100057c0 RegCreateKeyW 10923->10924 10925 100057cf 10924->10925 10926 100057e9 RegSetValueExW 10925->10926 10927 100057f7 10926->10927 10928 100057f9 RegCloseKey 10926->10928 10927->10928 10929 1000580f 10928->10929 10930 10003788 SysFreeString 10929->10930 10931 1000581c 10930->10931 10932 10003770 SysFreeString 10931->10932 10933 10005824 10932->10933 10934 10005664 10933->10934 11235 10006090 10934->11235 10936 10005673 10936->10764 10939 10003939 10937->10939 10938 10003981 10938->10767 10939->10938 10940 10003748 2 API calls 10939->10940 10941 10003953 10940->10941 10942 10003760 SysFreeString 10941->10942 10942->10938 11243 10005678 GetFileAttributesW 10943->11243 10946 10005766 10948 10005678 GetFileAttributesW 10946->10948 10947 100056b6 lstrlenW 10950 100056cb 10947->10950 10949 1000576d 10948->10949 10949->10770 10949->10771 10950->10946 10951 10005678 GetFileAttributesW 10950->10951 10952 10005745 CreateDirectoryW 10950->10952 10951->10950 10953 10005678 GetFileAttributesW 10952->10953 10954 1000575b 10953->10954 10954->10946 10954->10950 10956 10005cb9 10955->10956 10957 10005cbb FindClose 10955->10957 10956->10957 10957->10788 10958->10797 10959->10809 10961 100054e5 10960->10961 10962 100054fe CreateFileW CloseHandle FindExecutableW DeleteFileW 10961->10962 10962->10842 10964 10009944 10963->10964 10965 10009904 GetModuleHandleA WriteProcessMemory 10963->10965 10964->10820 10965->10964 10966 1000991f CreateRemoteThread CloseHandle 10965->10966 10966->10964 10968 1000b794 10967->10968 10968->10968 11245 1000b700 10968->11245 10970 1000b7ca 10971 10006404 3 API calls 10970->10971 11001 1000b7e9 10970->11001 10971->11001 10972 1000bbf2 10973 10003788 SysFreeString 10972->10973 10974 1000bc0f 10973->10974 11302 100032f0 10974->11302 10977 10003770 SysFreeString 10977->11001 10978 10003788 SysFreeString 10979 1000bc2f 10978->10979 10980 100032f0 11 API calls 10979->10980 10981 1000bc3f 10980->10981 10982 10003788 SysFreeString 10981->10982 10983 1000bc4f 10982->10983 10984 10003788 SysFreeString 10983->10984 10985 1000bc5c 10984->10985 10985->10841 10985->10852 10986 10003b04 SysAllocStringLen SysAllocStringLen SysFreeString 10986->11001 10988 100034b0 12 API calls 10988->11001 10989 100038e0 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen 10989->11001 10992 10005638 7 API calls 10992->11001 10994 10003988 SysAllocStringLen SysAllocStringLen SysFreeString 10994->11001 10996 10005eb4 CreateFileW SetFilePointer WriteFile CloseHandle 10996->11001 10997 10005324 SysFreeString SysAllocStringLen SysFreeString SysAllocStringLen GetTempPathW 10997->11001 10998 1000bb78 DeleteFileW 10998->11001 10999 100039ec SysAllocStringLen SysAllocStringLen SysFreeString 10999->11001 11000 1000352c 11 API calls 11000->11001 11001->10972 11001->10977 11001->10986 11001->10988 11001->10989 11001->10992 11001->10994 11001->10996 11001->10997 11001->10998 11001->10999 11001->11000 11002 1000577c 6 API calls 11001->11002 11003 1000bbb6 ShellExecuteW 11001->11003 11004 1000bbcf ShellExecuteW 11001->11004 11253 10003ab8 11001->11253 11257 1000553c 11001->11257 11281 10005350 GetWindowsDirectoryW 11001->11281 11288 100053d8 GetSystemDirectoryW 11001->11288 11295 10005460 11001->11295 11002->11001 11003->11001 11004->11001 11006 100039f4 11005->11006 11007 10003748 2 API calls 11006->11007 11008 10003a09 11007->11008 11009 10003760 SysFreeString 11008->11009 11010 10003a2a 11009->11010 11012 10005ca4 2 API calls 11011->11012 11013 1000cf23 11012->11013 11014 1000cf27 CreateFileW GetFileSize ReadFile CloseHandle 11013->11014 11015 1000cf68 11013->11015 11014->11015 11016 10005f1c 11015->11016 11017 10003c28 SysAllocStringLen 11016->11017 11018 10005f2d 11017->11018 11019 10005f43 GetFileAttributesW SetFileAttributesW 11018->11019 11020 10005f6a 11019->11020 11021 10003770 SysFreeString 11020->11021 11022 10005f72 11021->11022 11022->10802 11368 100050d8 11023->11368 11025 1000997a CreateProcessW 11026 100099b4 11025->11026 11027 100099a6 Sleep 11025->11027 11026->10843 11027->11026 11029 1000c088 11028->11029 11029->11029 11030 1000c08f 11 API calls 11029->11030 11031 1000c121 11030->11031 11032 10005664 3 API calls 11031->11032 11033 1000c13f 11032->11033 11034 100038e0 4 API calls 11033->11034 11035 1000c155 11034->11035 11036 10003928 3 API calls 11035->11036 11037 1000c165 11036->11037 11038 10005690 3 API calls 11037->11038 11039 1000c175 11038->11039 11040 1000c292 11039->11040 11041 1000c17d 11039->11041 11042 10005664 3 API calls 11040->11042 11043 10005664 3 API calls 11041->11043 11044 1000c29d 11042->11044 11045 1000c188 11043->11045 11046 100038e0 4 API calls 11044->11046 11047 100038e0 4 API calls 11045->11047 11048 1000c2b3 11046->11048 11049 1000c19e 11047->11049 11050 100038e0 4 API calls 11048->11050 11051 100038e0 4 API calls 11049->11051 11052 1000c2d4 11050->11052 11053 1000c1bf 11051->11053 11055 100039ec 3 API calls 11052->11055 11054 100039ec 3 API calls 11053->11054 11056 1000c1d7 11054->11056 11057 1000c2ec 11055->11057 11058 10005664 3 API calls 11056->11058 11059 10005664 3 API calls 11057->11059 11060 1000c1e2 11058->11060 11061 1000c2f7 11059->11061 11062 100038e0 4 API calls 11060->11062 11063 100038e0 4 API calls 11061->11063 11064 1000c1f8 11062->11064 11065 1000c30d 11063->11065 11066 100038e0 4 API calls 11064->11066 11067 100038e0 4 API calls 11065->11067 11069 1000c219 11066->11069 11068 1000c32e 11067->11068 11070 100039ec 3 API calls 11068->11070 11071 100039ec 3 API calls 11069->11071 11072 1000c346 11070->11072 11073 1000c231 11071->11073 11074 10005664 3 API calls 11072->11074 11075 10005664 3 API calls 11073->11075 11076 1000c351 11074->11076 11077 1000c23c 11075->11077 11078 100038e0 4 API calls 11076->11078 11079 100038e0 4 API calls 11077->11079 11080 1000c367 11078->11080 11081 1000c252 11079->11081 11082 100038e0 4 API calls 11080->11082 11083 100038e0 4 API calls 11081->11083 11084 1000c388 11082->11084 11085 1000c273 11083->11085 11087 100039ec 3 API calls 11084->11087 11086 100039ec 3 API calls 11085->11086 11088 1000c28d 11086->11088 11087->11088 11370 10006b14 11088->11370 11094 1000c3ef 11095 1000577c 6 API calls 11094->11095 11096 1000c415 11095->11096 11438 10004df0 CreateMutexW 11096->11438 11098 1000c425 GetLastError 11099 1000c434 ExitProcess 11098->11099 11100 1000c43b 11098->11100 11101 100038e0 4 API calls 11100->11101 11102 1000c44d 11101->11102 11439 100099f8 11102->11439 11107 1000c499 11109 1000c4fa 11107->11109 11111 100034b0 12 API calls 11107->11111 11112 1000c58f 11109->11112 11113 100038e0 4 API calls 11109->11113 11116 1000c4be 11111->11116 11115 10003770 SysFreeString 11112->11115 11124 1000c519 11113->11124 11114 10005f1c 4 API calls 11117 1000c491 11114->11117 11118 1000c599 11115->11118 11119 1000352c 11 API calls 11116->11119 11120 10005f1c 4 API calls 11117->11120 11121 100038e0 4 API calls 11118->11121 11122 1000c4d4 11119->11122 11120->11107 11123 1000c5ae 11121->11123 11128 1000577c 6 API calls 11122->11128 11125 100038e0 4 API calls 11123->11125 11124->11112 11126 100038e0 4 API calls 11124->11126 11127 1000c5d0 11125->11127 11129 1000c53b 11126->11129 11130 100038e0 4 API calls 11127->11130 11128->11109 11131 10005954 19 API calls 11129->11131 11132 1000c5e5 11130->11132 11141 1000c54f 11131->11141 11133 100038e0 4 API calls 11132->11133 11134 1000c5fa 11133->11134 11135 100038e0 4 API calls 11134->11135 11136 1000c636 11135->11136 11137 100038e0 4 API calls 11136->11137 11139 1000c64b 11137->11139 11138 10005ca4 2 API calls 11138->11141 11140 1000c659 11139->11140 11621 100093e4 11139->11621 11143 1000c673 11140->11143 11652 1000b634 11140->11652 11141->11112 11141->11138 11144 1000c561 SetFileAttributesW DeleteFileW Sleep 11141->11144 11664 1000aa54 11143->11664 11144->11141 11150 1000a480 ResumeThread 11151 1000c68e 11150->11151 11152 1000c69f 11151->11152 11674 10006058 11151->11674 11678 10008d4c 11152->11678 11155 1000c6a4 11156 1000c6c1 SetFileAttributesW 11155->11156 11686 10005eb4 CreateFileW 11156->11686 11158 1000c6dd 11159 100034b0 12 API calls 11158->11159 11160 1000c6f9 11159->11160 11161 1000352c 11 API calls 11160->11161 11162 1000c70f 11161->11162 11163 1000577c 6 API calls 11162->11163 11164 1000c735 11163->11164 11691 10004584 11164->11691 11166 1000c7a1 CloseHandle ExitProcess 11167 1000c7be 11166->11167 11168 10003770 SysFreeString 11167->11168 11170 1000c7c9 11168->11170 11169 10005954 19 API calls 11171 1000c753 11169->11171 11172 100032f0 11 API calls 11170->11172 11171->11166 11171->11169 11694 1000bd60 11171->11694 11174 1000c7d9 11172->11174 11175 10003788 SysFreeString 11174->11175 11176 1000c7e9 11175->11176 11177 100032f0 11 API calls 11176->11177 11178 1000c7f9 11177->11178 11179 10003788 SysFreeString 11178->11179 11180 1000c809 11179->11180 11181 100032f0 11 API calls 11180->11181 11182 1000c819 11181->11182 11183 10003788 SysFreeString 11182->11183 11184 1000c829 11183->11184 11185 10003770 SysFreeString 11184->11185 11186 1000c834 11185->11186 11709 10004590 11186->11709 11189 10003788 SysFreeString 11190 1000c84f 11189->11190 11190->10841 11192 1000378e 11191->11192 11193 10003794 SysFreeString 11192->11193 11194 100037a6 11192->11194 11193->11192 11194->10856 11196 10003784 11195->11196 11197 10003776 SysFreeString 11195->11197 11196->10869 11196->10870 11197->11196 11199 1000584a 11198->11199 11200 10005842 CharNextW 11199->11200 11210 1000586a 11199->11210 11200->11199 11201 100058d1 11202 10003be4 3 API calls 11201->11202 11211 100058da 11202->11211 11203 100058b3 CharNextW 11203->11210 11204 10005876 CharNextW 11204->11210 11205 100058a9 CharNextW 11205->11210 11206 1000594b 11206->10875 11207 10005880 CharNextW 11207->11210 11208 100058e8 CharNextW 11208->11211 11209 10005929 CharNextW 11209->11211 11210->11201 11210->11203 11210->11204 11210->11205 11210->11207 11211->11206 11211->11208 11211->11209 11212 100058f2 CharNextW 11211->11212 11213 1000591f CharNextW 11211->11213 11212->11211 11213->11211 11215 10003766 SysFreeString 11214->11215 11216 1000376c 11214->11216 11215->11216 11216->10750 11218 1000375c 11217->11218 11219 1000374c SysAllocStringLen 11217->11219 11218->10887 11219->11218 11220 10003740 11219->11220 11221 10003c44 11220->11221 11222 10003c2e SysAllocStringLen 11220->11222 11221->10887 11222->11220 11222->11221 11224 10003c44 11223->11224 11225 10003c2e SysAllocStringLen 11223->11225 11224->10891 11225->11224 11226 10003740 11225->11226 11226->11223 11228 1000641e 11227->11228 11231 100063c4 11228->11231 11230 1000643b 11230->10894 11232 100063d5 11231->11232 11233 10003be4 3 API calls 11232->11233 11234 100063e0 11233->11234 11234->11230 11236 100060bb 11235->11236 11237 100060d3 SHGetMalloc 11236->11237 11238 100060f5 SHGetSpecialFolderLocation 11237->11238 11242 100060df 11237->11242 11239 10006114 11238->11239 11240 10006132 11239->11240 11241 10006118 SHGetPathFromIDListW 11239->11241 11240->10936 11241->11240 11242->10936 11244 10005683 11243->11244 11244->10946 11244->10947 11244->10949 11246 10003770 SysFreeString 11245->11246 11247 1000b70d FindResourceW SizeofResource LoadResource LockResource 11246->11247 11248 1000b749 11247->11248 11249 1000b76a 11247->11249 11250 10003be4 3 API calls 11248->11250 11249->10970 11251 1000b754 11250->11251 11252 1000b764 FreeResource 11251->11252 11252->11249 11254 10003acb 11253->11254 11306 10003864 11254->11306 11256 10003afa 11256->11001 11258 10003c28 SysAllocStringLen 11257->11258 11259 10005557 11258->11259 11260 10003c28 SysAllocStringLen 11259->11260 11261 1000555f 11260->11261 11262 10003c28 SysAllocStringLen 11261->11262 11263 10005567 11262->11263 11264 100037ac 3 API calls 11263->11264 11265 1000557f 11264->11265 11266 1000558f RegOpenKeyExW 11265->11266 11267 10005605 11266->11267 11268 1000559a 11266->11268 11269 10003788 SysFreeString 11267->11269 11270 100055ae RegQueryValueExW 11268->11270 11271 1000561f 11269->11271 11272 100055fc RegCloseKey 11270->11272 11273 100055be 11270->11273 11274 10003770 SysFreeString 11271->11274 11272->11267 11276 10003be4 3 API calls 11273->11276 11275 10005627 11274->11275 11275->11001 11277 100055cf 11276->11277 11278 100055da RegQueryValueExW 11277->11278 11279 100055f2 11278->11279 11280 10003be4 3 API calls 11279->11280 11280->11272 11282 100038e0 4 API calls 11281->11282 11283 10005399 11282->11283 11315 10003988 11283->11315 11286 10003770 SysFreeString 11287 100053c3 11286->11287 11287->11001 11289 10005421 11288->11289 11290 100038e0 4 API calls 11288->11290 11291 10003988 3 API calls 11289->11291 11290->11289 11292 10005433 11291->11292 11293 10003770 SysFreeString 11292->11293 11294 1000544b 11293->11294 11294->11001 11296 1000547e 11295->11296 11297 10005350 9 API calls 11295->11297 11298 10003ab8 4 API calls 11296->11298 11297->11296 11299 1000549b 11298->11299 11300 10003770 SysFreeString 11299->11300 11301 100054b0 11300->11301 11301->11001 11304 100032f6 11302->11304 11303 1000331c 11303->10978 11304->11303 11321 10002520 11304->11321 11307 10003770 11306->11307 11308 1000386c SysAllocStringLen 11306->11308 11311 10003784 11307->11311 11312 10003776 SysFreeString 11307->11312 11309 10003740 11308->11309 11310 1000387c SysFreeString 11308->11310 11313 10003c44 11309->11313 11314 10003c2e SysAllocStringLen 11309->11314 11310->11256 11311->11256 11312->11311 11313->11256 11314->11309 11314->11313 11316 1000399f 11315->11316 11317 100039e5 11316->11317 11318 10003748 2 API calls 11316->11318 11317->11286 11319 100039bc 11318->11319 11320 10003760 SysFreeString 11319->11320 11320->11317 11322 10002525 11321->11322 11323 10002538 11321->11323 11322->11323 11325 100025e8 11322->11325 11323->11304 11326 1000259c 11325->11326 11327 100025c1 11326->11327 11331 10004c98 11326->11331 11339 10002590 11327->11339 11332 10004ca7 11331->11332 11333 10004ccd TlsGetValue 11331->11333 11332->11327 11334 10004cb2 11333->11334 11335 10004cd7 11333->11335 11342 10004c54 11334->11342 11335->11327 11337 10004cb7 TlsGetValue 11338 10004cc6 11337->11338 11338->11327 11349 10003230 11339->11349 11344 10004c5a 11342->11344 11343 10004c7e 11343->11337 11344->11343 11348 10004c40 LocalAlloc 11344->11348 11346 10004c7a 11346->11343 11347 10004c8a TlsSetValue 11346->11347 11347->11343 11348->11346 11352 10003158 11349->11352 11353 10003171 11352->11353 11354 10003190 11353->11354 11357 100031a1 11353->11357 11362 100030cc 11354->11362 11356 1000319a 11356->11357 11358 100031dc FreeLibrary 11357->11358 11360 100031e2 11357->11360 11358->11360 11359 10003217 11360->11359 11361 1000320f ExitProcess 11360->11361 11363 1000312d 11362->11363 11367 100030d6 GetStdHandle WriteFile GetStdHandle WriteFile 11362->11367 11365 10003136 MessageBoxA 11363->11365 11366 10003149 11363->11366 11365->11366 11366->11356 11367->11356 11369 100050df 11368->11369 11369->11025 11371 10006b1d 11370->11371 11371->11371 11372 10006b24 GetLocalTime 11371->11372 11373 10006b57 11372->11373 11374 10003988 3 API calls 11373->11374 11375 10006bb2 11373->11375 11374->11375 11376 10003988 3 API calls 11375->11376 11377 10006bcd 11375->11377 11376->11377 11378 10003988 3 API calls 11377->11378 11379 10006be8 11377->11379 11378->11379 11380 10003988 3 API calls 11379->11380 11382 10006c1f 11379->11382 11380->11382 11381 10006c3a 11715 10003888 11381->11715 11382->11381 11384 10003988 3 API calls 11382->11384 11384->11381 11386 10003888 4 API calls 11387 10006c57 11386->11387 11388 10003888 4 API calls 11387->11388 11389 10006c77 11388->11389 11390 10003888 4 API calls 11389->11390 11391 10006c87 11390->11391 11392 10003888 4 API calls 11391->11392 11393 10006c97 11392->11393 11394 100039ec 3 API calls 11393->11394 11395 10006caa 11394->11395 11396 10003788 SysFreeString 11395->11396 11397 10006cc4 11396->11397 11398 10003788 SysFreeString 11397->11398 11399 10006cd1 11398->11399 11400 100034b0 11399->11400 11401 100033fc 11400->11401 11402 10003415 11401->11402 11403 1000341e 11401->11403 11718 100032cc 11402->11718 11405 10003451 11403->11405 11722 100033c0 WideCharToMultiByte 11403->11722 11728 100036dc 11405->11728 11406 1000341c 11416 1000352c 11406->11416 11409 1000343c 11409->11405 11411 10003442 11409->11411 11410 1000345e 11734 100033c0 WideCharToMultiByte 11410->11734 11723 10003390 11411->11723 11414 1000346c 11415 100036dc 11 API calls 11414->11415 11415->11406 11417 10003530 11416->11417 11424 100034e8 11416->11424 11418 10003320 11417->11418 11420 10003540 11417->11420 11421 1000354e 11417->11421 11417->11424 11426 10003364 11 API calls 11418->11426 11427 10003334 11418->11427 11419 10003362 11419->11094 11744 10003320 11420->11744 11425 10003364 11 API calls 11421->11425 11423 1000352b 11423->11094 11424->11418 11424->11423 11428 100034f6 11424->11428 11434 10003561 11425->11434 11426->11427 11427->11419 11429 10002520 11 API calls 11427->11429 11430 10003520 11428->11430 11431 10003509 11428->11431 11429->11419 11432 100036dc 11 API calls 11430->11432 11433 100036dc 11 API calls 11431->11433 11435 1000350e 11432->11435 11433->11435 11436 10003320 11 API calls 11434->11436 11435->11094 11437 1000358d 11436->11437 11437->11094 11438->11098 11440 10009a01 11439->11440 11440->11440 11441 10003c28 SysAllocStringLen 11440->11441 11442 10009a2d 11441->11442 11443 100037ac 3 API calls 11442->11443 11444 10009a45 11443->11444 11445 10009dca 11444->11445 11446 10009a69 11444->11446 11447 10009a5c 11444->11447 11451 10003788 SysFreeString 11445->11451 11449 10009a7b 11446->11449 11450 10009a6e 11446->11450 11448 10005350 9 API calls 11447->11448 11465 10009a64 11448->11465 11454 10009a80 11449->11454 11455 10009a8d 11449->11455 11452 100053d8 9 API calls 11450->11452 11453 10009e0f 11451->11453 11452->11465 11458 100032cc 11 API calls 11453->11458 11459 10005460 13 API calls 11454->11459 11456 10009b02 11455->11456 11457 10009a92 11455->11457 11461 10009b07 11456->11461 11462 10009b3d 11456->11462 11750 10005638 11457->11750 11463 10009e1a 11458->11463 11459->11465 11467 10005664 3 API calls 11461->11467 11462->11465 11755 10005324 GetTempPathW 11462->11755 11468 10003788 SysFreeString 11463->11468 11464 100034b0 12 API calls 11469 10009b60 11464->11469 11465->11464 11466 10009a9d 11481 10009acc 11466->11481 11482 10009aac 11466->11482 11471 10009b12 11467->11471 11473 10009e2a 11468->11473 11470 10009b9a 11469->11470 11474 100038e0 4 API calls 11469->11474 11475 100038e0 4 API calls 11470->11475 11476 100038e0 4 API calls 11471->11476 11477 100032cc 11 API calls 11473->11477 11479 10009b82 11474->11479 11480 10009bb0 11475->11480 11483 10009b28 11476->11483 11478 10009e35 11477->11478 11484 10003770 SysFreeString 11478->11484 11485 100039ec 3 API calls 11479->11485 11486 10003988 3 API calls 11480->11486 11489 10005664 3 API calls 11481->11489 11487 10005638 7 API calls 11482->11487 11488 10003988 3 API calls 11483->11488 11490 10009e40 11484->11490 11485->11470 11500 10009bc4 11486->11500 11491 10009ab7 11487->11491 11488->11465 11492 10009ad7 11489->11492 11493 10003788 SysFreeString 11490->11493 11494 10003988 3 API calls 11491->11494 11495 100038e0 4 API calls 11492->11495 11496 10009e50 11493->11496 11494->11465 11497 10009aed 11495->11497 11499 10003788 SysFreeString 11496->11499 11498 10003988 3 API calls 11497->11498 11498->11465 11501 10009e5d 11499->11501 11500->11445 11502 10005690 3 API calls 11500->11502 11547 10009e74 11501->11547 11503 10009be5 11502->11503 11503->11445 11504 100038e0 4 API calls 11503->11504 11505 10009c08 11504->11505 11506 10003988 3 API calls 11505->11506 11507 10009c1c 11506->11507 11508 10009c27 SetFileAttributesW 11507->11508 11509 100038e0 4 API calls 11508->11509 11510 10009c45 11509->11510 11511 10003988 3 API calls 11510->11511 11512 10009c59 11511->11512 11513 10009c6d CopyFileW 11512->11513 11514 10009c83 11513->11514 11515 10009dcc 11513->11515 11516 10005664 3 API calls 11514->11516 11517 100038e0 4 API calls 11515->11517 11518 10009c8e 11516->11518 11519 10009de2 11517->11519 11520 100038e0 4 API calls 11518->11520 11521 10003988 3 API calls 11519->11521 11522 10009ca4 11520->11522 11521->11445 11523 10003988 3 API calls 11522->11523 11524 10009cb7 11523->11524 11525 100034b0 12 API calls 11524->11525 11526 10009ccd 11525->11526 11527 10009d07 11526->11527 11528 100038e0 4 API calls 11526->11528 11531 10005690 3 API calls 11527->11531 11529 10009cef 11528->11529 11530 100039ec 3 API calls 11529->11530 11530->11527 11532 10009d14 11531->11532 11532->11445 11533 100038e0 4 API calls 11532->11533 11534 10009d37 11533->11534 11535 10003988 3 API calls 11534->11535 11536 10009d4b 11535->11536 11537 10009d56 SetFileAttributesW 11536->11537 11538 100038e0 4 API calls 11537->11538 11539 10009d74 11538->11539 11540 10003988 3 API calls 11539->11540 11541 10009d88 11540->11541 11542 10009d93 CopyFileW 11541->11542 11542->11445 11543 10009da4 11542->11543 11544 100038e0 4 API calls 11543->11544 11545 10009dba 11544->11545 11546 10003988 3 API calls 11545->11546 11546->11445 11548 10009e7c 11547->11548 11548->11548 11549 10003c28 SysAllocStringLen 11548->11549 11550 10009ea1 11549->11550 11551 10009ef6 11550->11551 11552 1000a0cd 11550->11552 11553 100038e0 4 API calls 11550->11553 11555 10009f30 11551->11555 11559 100038e0 4 API calls 11551->11559 11554 10003788 SysFreeString 11552->11554 11557 10009ee1 11553->11557 11558 1000a0ea 11554->11558 11556 10009fd6 11555->11556 11561 100038e0 4 API calls 11555->11561 11556->11552 11565 100034b0 12 API calls 11556->11565 11562 1000577c 6 API calls 11557->11562 11563 100032cc 11 API calls 11558->11563 11560 10009f1b 11559->11560 11564 1000577c 6 API calls 11560->11564 11566 10009f53 11561->11566 11562->11551 11567 1000a0f5 11563->11567 11564->11555 11575 10009ff9 11565->11575 11568 10003988 3 API calls 11566->11568 11569 10003788 SysFreeString 11567->11569 11570 10009f69 11568->11570 11571 1000a105 11569->11571 11758 100059e8 11570->11758 11572 10003788 SysFreeString 11571->11572 11574 1000a112 11572->11574 11574->11107 11599 10005d78 11574->11599 11576 1000a019 11575->11576 11769 10005240 11575->11769 11580 100038e0 4 API calls 11576->11580 11579 10003988 3 API calls 11581 10009f8c 11579->11581 11582 1000a041 11580->11582 11583 100038e0 4 API calls 11581->11583 11586 10003ab8 4 API calls 11582->11586 11584 10009fab 11583->11584 11585 10003988 3 API calls 11584->11585 11588 10009fc1 11585->11588 11587 1000a062 11586->11587 11774 10003b04 11587->11774 11589 1000577c 6 API calls 11588->11589 11589->11556 11594 100038e0 4 API calls 11595 1000a09e 11594->11595 11596 100038e0 4 API calls 11595->11596 11597 1000a0bd 11596->11597 11598 1000577c 6 API calls 11597->11598 11598->11552 11600 10003c28 SysAllocStringLen 11599->11600 11601 10005d8a 11600->11601 11785 10005d00 11601->11785 11604 10005db3 11606 10005d00 2 API calls 11604->11606 11617 10005de1 11604->11617 11605 10005d00 2 API calls 11605->11604 11607 10005dc2 11606->11607 11608 10005de3 11607->11608 11609 10005dc5 11607->11609 11610 10005d00 2 API calls 11608->11610 11611 10005d00 2 API calls 11609->11611 11613 10005def 11610->11613 11612 10005dd2 11611->11612 11615 10003ab8 4 API calls 11612->11615 11613->11617 11618 10005d00 2 API calls 11613->11618 11614 10003770 SysFreeString 11616 10005e23 11614->11616 11615->11617 11616->11114 11617->11614 11619 10005dff 11618->11619 11620 10003ab8 4 API calls 11619->11620 11620->11617 11622 10008d4c 4 API calls 11621->11622 11624 10009400 11622->11624 11623 10009431 11625 10009442 ShowWindow 11623->11625 11624->11623 11790 10006510 11624->11790 11626 100037ac 3 API calls 11625->11626 11628 10009457 11626->11628 11629 10009466 SetFileAttributesW 11628->11629 11795 1000390c 11629->11795 11632 100095be 11635 10003788 SysFreeString 11632->11635 11633 1000949d 11634 10009547 11633->11634 11797 10006788 11633->11797 11638 10009553 SetFileAttributesW SetFilePointer 11634->11638 11637 100095dd 11635->11637 11637->11140 11811 1000662c 11638->11811 11641 1000957e SendMessageA 11812 1000662c 11641->11812 11643 1000958e SetClipboardViewer 11643->11632 11645 1000959d 11643->11645 11644 100094e1 11648 10003988 3 API calls 11644->11648 11646 100095b0 11645->11646 11813 10006768 TerminateThread CloseHandle 11645->11813 11814 10006744 CreateThread SetThreadPriority 11646->11814 11650 10009535 11648->11650 11651 1000577c 6 API calls 11650->11651 11651->11634 11653 1000b63e 11652->11653 11654 10003c28 SysAllocStringLen 11653->11654 11655 1000b655 11654->11655 11656 100037ac 3 API calls 11655->11656 11657 1000b66e 11656->11657 11847 1000a3c4 11657->11847 11659 1000b679 11660 10003770 SysFreeString 11659->11660 11661 1000b68e 11660->11661 11662 1000a480 ResumeThread 11661->11662 11663 1000a48f 11662->11663 11663->11143 11665 1000aa6b 11664->11665 11666 10003c28 SysAllocStringLen 11665->11666 11667 1000aa8e 11666->11667 11668 100037ac 3 API calls 11667->11668 11669 1000aabc 11668->11669 11670 1000a3c4 13 API calls 11669->11670 11671 1000aac7 11670->11671 11672 10003770 SysFreeString 11671->11672 11673 1000aadc 11672->11673 11673->11150 11675 1000605b 11674->11675 11677 10006066 11675->11677 11857 10006024 PeekMessageA 11675->11857 11677->11151 11679 10008d74 11678->11679 11680 10008d5a 11678->11680 11681 10008d88 11679->11681 11682 10008d7d CloseHandle 11679->11682 11683 10008d6e SendMessageA 11680->11683 11684 10008da2 11681->11684 11860 10006768 TerminateThread CloseHandle 11681->11860 11682->11681 11683->11679 11684->11155 11687 10005f0a CloseHandle 11686->11687 11688 10005edb 11686->11688 11687->11158 11689 10005ef3 WriteFile 11688->11689 11690 10005ee7 SetFilePointer 11688->11690 11689->11687 11690->11689 11861 100043f8 11691->11861 11695 1000bd7a 11694->11695 11696 10003c28 SysAllocStringLen 11695->11696 11697 1000bd82 11696->11697 11698 1000be37 CreateProcessW 11697->11698 11699 1000bfd5 11698->11699 11700 1000be47 6 API calls 11698->11700 11704 10003770 SysFreeString 11699->11704 11701 1000bf76 WriteProcessMemory 11700->11701 11702 1000beed 11700->11702 11701->11699 11703 1000bfb0 SetThreadContext ResumeThread 11701->11703 11706 1000bf1e WriteProcessMemory VirtualProtectEx 11702->11706 11703->11699 11705 1000c018 11704->11705 11707 10004590 13 API calls 11705->11707 11706->11701 11706->11702 11708 1000c026 11707->11708 11708->11171 11711 10004596 11709->11711 11714 100045c8 11709->11714 11710 100045c0 11712 10002520 11 API calls 11710->11712 11711->11710 11711->11714 11918 10003c94 11711->11918 11712->11714 11714->11189 11716 10003864 4 API calls 11715->11716 11717 10003895 11716->11717 11717->11386 11719 100032d2 11718->11719 11720 100032ed 11718->11720 11719->11720 11721 10002520 11 API calls 11719->11721 11720->11406 11721->11720 11722->11409 11735 10003364 11723->11735 11725 100033a0 11726 100032cc 11 API calls 11725->11726 11727 100033b8 11726->11727 11727->11406 11729 100036e9 11728->11729 11733 10003719 11728->11733 11731 100036f5 11729->11731 11732 10003364 11 API calls 11729->11732 11730 100032cc 11 API calls 11730->11731 11731->11410 11732->11733 11733->11730 11734->11414 11736 10003368 11735->11736 11737 1000338c 11735->11737 11740 10002500 11736->11740 11737->11725 11741 10002505 11740->11741 11742 10002518 11740->11742 11741->11742 11743 100025e8 11 API calls 11741->11743 11742->11725 11743->11742 11745 10003324 11744->11745 11747 10003334 11744->11747 11745->11747 11748 10003364 11 API calls 11745->11748 11746 10003362 11746->11424 11747->11746 11749 10002520 11 API calls 11747->11749 11748->11747 11749->11746 11751 10006090 3 API calls 11750->11751 11752 1000564d 11751->11752 11753 100038e0 4 API calls 11752->11753 11754 1000565b 11753->11754 11754->11466 11756 100038e0 4 API calls 11755->11756 11757 10005346 11756->11757 11757->11465 11759 10005a01 11758->11759 11760 10003c28 SysAllocStringLen 11758->11760 11761 10004584 16 API calls 11759->11761 11760->11759 11762 10005a2d 11761->11762 11763 10005a4e SHDeleteKeyW 11762->11763 11764 10005a6c 11763->11764 11765 10004590 13 API calls 11764->11765 11766 10005a7a 11765->11766 11767 10003770 SysFreeString 11766->11767 11768 10005a82 11767->11768 11768->11579 11770 10003c28 SysAllocStringLen 11769->11770 11771 10005252 11770->11771 11772 10003770 SysFreeString 11771->11772 11773 100052a3 11772->11773 11773->11576 11776 10003b17 11774->11776 11775 10003b8b 11780 10005a94 11775->11780 11776->11775 11777 10003748 2 API calls 11776->11777 11778 10003b41 11776->11778 11777->11778 11779 10003760 SysFreeString 11778->11779 11779->11775 11781 10003c28 SysAllocStringLen 11780->11781 11782 10005aa4 11781->11782 11783 10003770 SysFreeString 11782->11783 11784 10005b86 11783->11784 11784->11594 11786 10003c28 SysAllocStringLen 11785->11786 11787 10005d14 11786->11787 11788 10003770 SysFreeString 11787->11788 11789 10005d67 11788->11789 11789->11604 11789->11605 11791 1000651c 11790->11791 11792 10006545 GetDesktopWindow GetWindowRect GetModuleHandleA RegisterClassW 11791->11792 11815 10005148 11792->11815 11794 100065bb 11794->11623 11796 10003910 CreateFileW 11795->11796 11796->11632 11796->11633 11798 10003988 3 API calls 11797->11798 11799 100067bd 11798->11799 11800 1000553c 13 API calls 11799->11800 11801 100067cf 11800->11801 11802 10006827 11801->11802 11803 100067db 11801->11803 11806 10003988 3 API calls 11802->11806 11820 100066a0 11803->11820 11805 100067f1 11809 10003788 SysFreeString 11805->11809 11807 10006868 11806->11807 11807->11805 11808 1000577c 6 API calls 11807->11808 11808->11805 11810 100068a6 GetFileSize 11809->11810 11810->11644 11811->11641 11812->11643 11813->11646 11814->11632 11819 10002664 11815->11819 11817 1000515b CreateWindowExW 11818 10005195 11817->11818 11818->11794 11819->11817 11821 10003c28 SysAllocStringLen 11820->11821 11822 100066b6 11821->11822 11829 100034cc 11822->11829 11824 100066cf 11825 100032cc 11 API calls 11824->11825 11826 100066f5 11825->11826 11827 10003770 SysFreeString 11826->11827 11828 100066fd 11827->11828 11828->11805 11830 100033fc 11829->11830 11831 10003415 11830->11831 11832 1000341e 11830->11832 11833 100032cc 11 API calls 11831->11833 11834 10003451 11832->11834 11845 100033c0 WideCharToMultiByte 11832->11845 11835 1000341c 11833->11835 11837 100036dc 11 API calls 11834->11837 11835->11824 11839 1000345e 11837->11839 11838 1000343c 11838->11834 11840 10003442 11838->11840 11846 100033c0 WideCharToMultiByte 11839->11846 11842 10003390 11 API calls 11840->11842 11842->11835 11843 1000346c 11844 100036dc 11 API calls 11843->11844 11844->11835 11845->11838 11846->11843 11848 1000a3ce 11847->11848 11853 1000a318 InterlockedIncrement 11848->11853 11850 1000a3eb 11854 10003280 11850->11854 11852 1000a406 11852->11659 11853->11850 11855 10002500 11 API calls 11854->11855 11856 10003296 CreateThread 11855->11856 11856->11852 11858 1000604a Sleep 11857->11858 11859 1000603c TranslateMessage DispatchMessageA 11857->11859 11858->11675 11859->11858 11860->11684 11862 10004417 11861->11862 11866 10004431 11861->11866 11863 10004422 11862->11863 11864 100025e8 11 API calls 11862->11864 11875 100043f0 11863->11875 11864->11863 11867 1000447b 11866->11867 11868 100025e8 11 API calls 11866->11868 11869 10002500 11 API calls 11867->11869 11871 10004488 11867->11871 11868->11867 11870 100044c7 11869->11870 11870->11871 11878 100043d8 11870->11878 11872 1000442c 11871->11872 11874 100043f8 16 API calls 11871->11874 11872->11171 11874->11871 11876 10004590 13 API calls 11875->11876 11877 100043f5 11876->11877 11877->11872 11881 10003eb4 11878->11881 11880 100043e3 11880->11871 11882 10003ec9 11881->11882 11883 10003eef 11881->11883 11885 10003f11 11882->11885 11886 10003ece 11882->11886 11884 10003320 11 API calls 11883->11884 11895 10003f0c 11883->11895 11884->11883 11887 100037ac 3 API calls 11885->11887 11885->11895 11888 10003ed3 11886->11888 11889 10003f25 11886->11889 11887->11885 11890 10003ed8 11888->11890 11891 10003f39 11888->11891 11889->11895 11900 10003d80 11889->11900 11893 10003f5a 11890->11893 11894 10003edd 11890->11894 11891->11895 11896 10003eb4 16 API calls 11891->11896 11893->11895 11905 10003d98 11893->11905 11894->11883 11894->11895 11898 10003f8b 11894->11898 11895->11880 11896->11891 11898->11895 11914 100045cc 11898->11914 11901 10003d90 11900->11901 11902 10003d89 11900->11902 11903 100025e8 11 API calls 11901->11903 11902->11889 11904 10003d97 11903->11904 11904->11889 11909 10003db2 11905->11909 11906 10003320 11 API calls 11906->11909 11907 100037ac 3 API calls 11907->11909 11908 10003d80 11 API calls 11908->11909 11909->11906 11909->11907 11909->11908 11910 10003e9e 11909->11910 11911 10003eb4 16 API calls 11909->11911 11912 10003d98 16 API calls 11909->11912 11913 100045cc 13 API calls 11909->11913 11910->11893 11911->11909 11912->11909 11913->11909 11916 100045d3 11914->11916 11915 100045ed 11915->11898 11916->11915 11917 10004590 13 API calls 11916->11917 11917->11915 11919 10003c9d 11918->11919 11938 10003cd2 11918->11938 11920 10003cb2 11919->11920 11921 10003cd7 11919->11921 11922 10003cf4 11920->11922 11923 10003cb6 11920->11923 11924 10003ce8 11921->11924 11925 10003cde 11921->11925 11929 10003d02 11922->11929 11930 10003cfb 11922->11930 11926 10003cba 11923->11926 11936 10003d0b 11923->11936 11928 100032f0 11 API calls 11924->11928 11927 100032cc 11 API calls 11925->11927 11932 10003cbe 11926->11932 11937 10003d1a 11926->11937 11927->11938 11928->11938 11933 10003788 SysFreeString 11929->11933 11931 10003770 SysFreeString 11930->11931 11931->11938 11935 10003d38 11932->11935 11942 10003cc2 11932->11942 11933->11938 11935->11938 11948 10003c48 11935->11948 11936->11938 11943 10003c7c 11936->11943 11937->11938 11939 10003c94 13 API calls 11937->11939 11938->11710 11939->11937 11941 10004590 13 API calls 11941->11942 11942->11938 11942->11941 11944 10003c85 11943->11944 11945 10003c8c 11943->11945 11944->11936 11946 100025e8 11 API calls 11945->11946 11947 10003c93 11946->11947 11947->11936 11949 10003c5a 11948->11949 11950 10003c94 13 API calls 11949->11950 11951 10003c73 11949->11951 11950->11949 11951->11935 11952 10003158 11953 10003171 11952->11953 11954 10003190 11953->11954 11957 100031a1 11953->11957 11955 100030cc 5 API calls 11954->11955 11956 1000319a 11955->11956 11956->11957 11958 100031dc FreeLibrary 11957->11958 11960 100031e2 11957->11960 11958->11960 11959 10003217 11960->11959 11961 1000320f ExitProcess 11960->11961 11962 10001f2c 11963 10001f40 11962->11963 11964 10001f49 11962->11964 11980 10001840 RtlInitializeCriticalSection 11963->11980 11966 10001f72 RtlEnterCriticalSection 11964->11966 11968 10001f7c 11964->11968 11971 10001f51 11964->11971 11966->11968 11968->11971 11974 10001e38 11968->11974 11972 100020a7 11973 1000209d RtlLeaveCriticalSection 11973->11972 11977 10001e48 11974->11977 11975 10001e74 11979 10001e98 11975->11979 11992 10001c4c 11975->11992 11977->11975 11977->11979 11987 10001dac 11977->11987 11979->11972 11979->11973 11981 10001864 RtlEnterCriticalSection 11980->11981 11982 1000186e 11980->11982 11981->11982 11983 1000188c LocalAlloc 11982->11983 11984 100018a6 11983->11984 11985 100018f5 11984->11985 11986 100018eb RtlLeaveCriticalSection 11984->11986 11985->11964 11985->11971 11986->11985 11996 10001600 11987->11996 11989 10001dbc 11990 10001dc9 11989->11990 12005 10001d20 11989->12005 11990->11977 11993 10001ca1 11992->11993 11994 10001c6a 11992->11994 11993->11994 12064 10001b9c 11993->12064 11994->11979 12001 1000161c 11996->12001 11997 10001626 12012 100014ec 11997->12012 12001->11997 12002 10001632 12001->12002 12003 10001677 12001->12003 12016 10001358 12001->12016 12024 10001254 12001->12024 12002->11989 12028 10001434 12003->12028 12038 10001cd4 12005->12038 12008 10001254 LocalAlloc 12009 10001d44 12008->12009 12011 10001d4c 12009->12011 12042 10001a78 12009->12042 12011->11990 12013 10001532 12012->12013 12014 1000154e VirtualAlloc 12013->12014 12015 10001562 12013->12015 12014->12013 12014->12015 12015->12002 12017 10001367 VirtualAlloc 12016->12017 12019 10001394 12017->12019 12020 100013b7 12017->12020 12032 1000120c 12019->12032 12020->12001 12023 100013a4 VirtualFree 12023->12020 12025 10001270 12024->12025 12026 1000120c LocalAlloc 12025->12026 12027 100012b6 12026->12027 12027->12001 12031 10001463 12028->12031 12029 100014bc 12029->12002 12030 10001490 VirtualFree 12030->12031 12031->12029 12031->12030 12035 100011b4 12032->12035 12036 100011c0 LocalAlloc 12035->12036 12037 100011d2 12035->12037 12036->12037 12037->12020 12037->12023 12039 10001ce6 12038->12039 12040 10001cdd 12038->12040 12039->12008 12040->12039 12047 10001aa8 12040->12047 12043 10001a95 12042->12043 12044 10001a86 12042->12044 12043->12011 12045 10001c4c 9 API calls 12044->12045 12046 10001a93 12045->12046 12046->12011 12050 100020bc 12047->12050 12049 10001ac9 12049->12039 12051 100020da 12050->12051 12052 100020d5 12050->12052 12053 1000210b RtlEnterCriticalSection 12051->12053 12058 10002115 12051->12058 12060 100020de 12051->12060 12054 10001840 4 API calls 12052->12054 12053->12058 12054->12051 12055 10002121 12056 10002243 RtlLeaveCriticalSection 12055->12056 12057 1000224d 12055->12057 12056->12057 12057->12049 12058->12055 12059 100021a4 12058->12059 12062 100021d0 12058->12062 12059->12060 12061 10001cd4 7 API calls 12059->12061 12060->12049 12061->12060 12062->12055 12063 10001c4c 7 API calls 12062->12063 12063->12055 12066 10001bb2 12064->12066 12065 10001c3a 12065->11994 12066->12065 12067 10001bf1 12066->12067 12068 10001bdd 12066->12068 12070 100017b4 3 API calls 12067->12070 12077 100017b4 12068->12077 12071 10001bef 12070->12071 12071->12065 12072 10001a78 9 API calls 12071->12072 12073 10001c15 12072->12073 12074 10001c2f 12073->12074 12087 10001acc 12073->12087 12092 100012c4 12074->12092 12078 100017da 12077->12078 12086 10001833 12077->12086 12096 10001580 12078->12096 12081 10001254 LocalAlloc 12082 100017f7 12081->12082 12083 1000180e 12082->12083 12084 10001434 VirtualFree 12082->12084 12085 100012c4 LocalAlloc 12083->12085 12083->12086 12084->12083 12085->12086 12086->12071 12088 10001ad1 12087->12088 12089 10001adf 12087->12089 12090 10001aa8 9 API calls 12088->12090 12089->12074 12091 10001ade 12090->12091 12091->12074 12093 100012cf 12092->12093 12094 100012ea 12093->12094 12095 1000120c LocalAlloc 12093->12095 12094->12065 12095->12094 12099 100015b7 12096->12099 12097 100015f7 12097->12081 12098 100015d1 VirtualFree 12098->12099 12099->12097 12099->12098

                  Control-flow Graph

                  APIs
                  • GetModuleHandleA.KERNEL32(00000000), ref: 100098C0
                  • VirtualFreeEx.KERNEL32(00000000,?,00000000,00008000,?,00000000), ref: 100098EA
                  • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 100098F9
                  • GetModuleHandleA.KERNEL32(00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000,?,00000000), ref: 1000990C
                  • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 10009914
                  • CreateRemoteThread.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000), ref: 10009935
                  • CloseHandle.KERNEL32(00000000,00000000,?,00000000,00000000,?,?,00000000,?,?,00003000,00000040,00000000,?,00000000,00008000), ref: 1000993B
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Handle$ModuleVirtual$AllocCloseCreateFreeMemoryProcessRemoteThreadWrite
                  • String ID:
                  • API String ID: 2398686212-0
                  • Opcode ID: 8b33c0d4130813cb4961417709022df427b3791c4551b7101a0d9c88382725a9
                  • Instruction ID: 56678c190a81291c74d5659315aa0a406f5499a7e455af1083e81e7bb303a9db
                  • Opcode Fuzzy Hash: 8b33c0d4130813cb4961417709022df427b3791c4551b7101a0d9c88382725a9
                  • Instruction Fuzzy Hash: 161130B52443417FE350DA69CC82F2B77ECEBC4790F01882CB648D7292DA70F814876A
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 562 10005ca4-10005cb7 FindFirstFileW 563 10005cb9 562->563 564 10005cbb-10005cca FindClose 562->564 563->564
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,00000000,1000D3CA,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005CAF
                  • FindClose.KERNEL32(00000000,00000000,?,00000000,1000D3CA,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005CBC
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Find$CloseFileFirst
                  • String ID:
                  • API String ID: 2295610775-0
                  • Opcode ID: 330f1bf4dbc552c91da48253f5c4906a029c88ec3c8321f42aab6186b9465800
                  • Instruction ID: 7a3a1ab874b80ece1c9db2ee4d12350f52d059cd31b038f16b98c78c9643ece9
                  • Opcode Fuzzy Hash: 330f1bf4dbc552c91da48253f5c4906a029c88ec3c8321f42aab6186b9465800
                  • Instruction Fuzzy Hash: CBC01295941A0016B90055B45CCB897210DD7411B5F150731BA25863D4DB1E581A10A9
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 1000d0f4-1000d0f7 1 1000d0fc-1000d101 0->1 1->1 2 1000d103-1000d159 call 10004ce4 call 10003024 SetErrorMode call 10005954 call 10003a34 1->2 11 1000d196-1000d1b0 call 10005954 call 10003a34 2->11 12 1000d15b-1000d191 call 10005954 call 100037ac call 1000390c ShellExecuteW ExitProcess 2->12 22 1000d1b2-1000d1b7 Sleep 11->22 23 1000d1bc-1000d2fa call 100050d8 call 100051e8 call 10003be4 call 1000390c call 100050d0 call 10006234 call 100037ac call 100050d8 call 1000390c call 100050d0 call 100037ac call 1000390c SHDeleteKeyW call 100038e0 call 1000577c call 10005664 call 100038e0 call 10003928 call 1000390c call 10005690 11->23 22->23 63 1000d35a-1000d3b2 call 10005664 call 100038e0 * 2 call 100039ec 23->63 64 1000d2fc-1000d358 call 10005664 call 100038e0 * 2 call 100039ec 23->64 79 1000d3b7-1000d3cc call 1000390c call 10005ca4 63->79 64->79 85 1000d3d2-1000d47e SetFileAttributesW call 1000cf04 call 10005f1c call 10003fd4 call 10003be4 call 1000390c call 100050d0 call 10006234 call 100037ac call 100050d8 call 1000390c call 100050d0 79->85 86 1000d483-1000d48d 79->86 85->86 88 1000d493-1000d535 SetFileAttributesW DeleteFileW call 100050d8 call 100051e8 call 10003be4 call 1000390c call 100050d0 call 10006234 call 100037ac call 100050d8 call 1000390c call 100050d0 86->88 89 1000d53a-1000d556 call 10004df0 GetLastError 86->89 88->89 97 1000d558-1000d55a ExitProcess 89->97 98 1000d55f-1000d56c CloseHandle 89->98 101 1000d5d8-1000d610 GetModuleFileNameW call 100038e0 call 10003a34 98->101 102 1000d56e-1000d579 call 10004df0 98->102 123 1000d612-1000d614 101->123 124 1000d616-1000d63d call 100038e0 call 10003a34 101->124 110 1000d57e-1000d58a GetLastError 102->110 114 1000d5d2-1000d5d3 CloseHandle 110->114 115 1000d58c-1000d5d0 CloseHandle call 1000391c call 1000390c call 100050d0 call 10009950 call 100098a8 110->115 114->101 115->101 128 1000d68f-1000d698 123->128 149 1000d66e-1000d68d call 100050d0 call 10009950 124->149 150 1000d63f-1000d645 call 100054c4 124->150 133 1000d69a-1000d6ab call 1000b78c call 1000c080 128->133 134 1000d6ad-1000d6c2 call 100098a8 128->134 166 1000d71e-1000d758 call 10003788 * 3 133->166 152 1000d6c4-1000d6e3 TerminateProcess call 10009950 Sleep 134->152 153 1000d6e8-1000d6f0 134->153 149->128 167 1000d64a-1000d66c call 10009950 150->167 152->153 162 1000d6f2-1000d6f9 153->162 163 1000d6fb-1000d6fd call 1000b78c 153->163 162->134 162->163 178 1000d702-1000d704 163->178 167->128 178->166 184 1000d706-1000d719 TerminateProcess call 1000c080 178->184 184->166
                  APIs
                  • SetErrorMode.KERNEL32(00008007,00000000,1000D759,?,?,?,?,00000000,00000000), ref: 1000D13A
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 1000D18A
                  • ExitProcess.KERNEL32(00000000,00000000,open,00000000,00000000,00000000,00000000,00008007,00000000,1000D759,?,?,?,?,00000000,00000000), ref: 1000D191
                  • Sleep.KERNEL32(00001770,00008007,00000000,1000D759,?,?,?,?,00000000,00000000), ref: 1000D1B7
                  • SHDeleteKeyW.SHLWAPI(80000001,00000000,00008007,00000000,1000D759,?,?,?,?,00000000,00000000), ref: 1000D281
                    • Part of subcall function 1000577C: RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 100057C2
                    • Part of subcall function 1000577C: RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057EE
                    • Part of subcall function 1000577C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057FD
                    • Part of subcall function 10005690: lstrlenW.KERNEL32(00000000,1000F834,1000F834,?,1000D2F8,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 100056B7
                  • SetFileAttributesW.KERNEL32(00000000,00000080,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 1000D3D8
                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 1000D499
                  • DeleteFileW.KERNEL32(00000000,00000000,00000080), ref: 1000D49F
                    • Part of subcall function 10004DF0: CreateMutexW.KERNEL32(?,?,?,?,1000D54A,00000000,00000000,wzk5VL6RM0QU9blk), ref: 10004E06
                  • GetLastError.KERNEL32(00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D54C
                  • ExitProcess.KERNEL32(00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D55A
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D560
                  • GetLastError.KERNEL32(00000000,00000000,wzk5VL6RM0QU9blkPERSIST,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D580
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,wzk5VL6RM0QU9blkPERSIST,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D58D
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,wzk5VL6RM0QU9blkPERSIST,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D5D3
                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D5E4
                  • TerminateProcess.KERNEL32(00000000,00000000,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D6CD
                  • Sleep.KERNEL32(000001F4,00000000,00000000,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D6E3
                  • TerminateProcess.KERNEL32(00000000,00000000,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 1000D70F
                    • Part of subcall function 100054C4: GetTempPathW.KERNEL32(00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 100054D4
                    • Part of subcall function 100054C4: CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000), ref: 10005515
                    • Part of subcall function 100054C4: CloseHandle.KERNEL32(00000000,?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 1000551B
                    • Part of subcall function 100054C4: FindExecutableW.SHELL32(?,00000000,?), ref: 10005528
                    • Part of subcall function 100054C4: DeleteFileW.KERNEL32(?,00000000,?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe), ref: 1000552E
                    • Part of subcall function 10009950: CreateProcessW.KERNEL32 ref: 1000999D
                    • Part of subcall function 10009950: Sleep.KERNEL32(00000064,00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?,1000F834,1000F834,00000000,1000D68D,00000000), ref: 100099AF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseProcess$CreateHandle$DeleteErrorSleep$AttributesExitLastTerminate$ExecutableExecuteFindModeModuleMutexNamePathShellTempValuelstrlen
                  • String ID: .cfg$C:\Program Files\Google\Chrome\Application\chrome.exe$C:\Users\user\Desktop\gKi3fKq4Kh.exe$CONFIG$Mutex$SOFTWARE\XtremeRAT$\Microsoft\Windows\$open$restart$svchost.exe$update$wzk5VL6RM0QU9blk$wzk5VL6RM0QU9blkPERSIST$O
                  • API String ID: 17641713-2566548298
                  • Opcode ID: 505c14424dfcb23af79bd2a44f64f6aa8ae68e70c4de436f47dbc495ab51ce5a
                  • Instruction ID: 7babdffad351a71ae314de662e95e98ead1dbb94228c143735747afee298a140
                  • Opcode Fuzzy Hash: 505c14424dfcb23af79bd2a44f64f6aa8ae68e70c4de436f47dbc495ab51ce5a
                  • Instruction Fuzzy Hash: E2E1B5787005559BF715E764CC82B9FB3AAEB803C0F508061F5489B29EEEB5FE418B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 196 1000b78c-1000b78f 197 1000b794-1000b799 196->197 197->197 198 1000b79b-1000b7d4 call 1000b700 call 10003a34 197->198 203 1000b7d6-1000b7f2 call 10006404 call 100037d0 198->203 204 1000b7f7-1000b801 call 10003a34 198->204 203->204 210 1000bbf2-1000bc5c call 10003788 call 100032f0 call 10003788 call 100032f0 call 10003788 * 2 204->210 211 1000b807 204->211 213 1000bbe2-1000bbec call 10003a34 211->213 213->210 218 1000b80c-1000b8a3 call 10003770 * 2 call 100050d8 call 1000390c call 100050d0 call 10003b04 call 10003fd4 call 10003ab8 call 10003fd4 call 10003b04 213->218 249 1000b8a9-1000b929 call 100038e0 call 100034b0 call 1000352c call 100038fc call 1000553c call 10003a34 218->249 250 1000b99d-1000b9a5 218->250 249->213 314 1000b92f-1000b998 call 100038e0 call 100034b0 call 1000352c call 100038fc call 1000577c 249->314 251 1000b9a7-1000b9da call 100038e0 call 10005350 call 10003988 250->251 252 1000b9df-1000b9e2 250->252 272 1000baed-1000bb1b call 10003988 call 1000390c call 10005eb4 251->272 256 1000b9e4-1000ba17 call 100038e0 call 100053d8 call 10003988 252->256 257 1000ba1c-1000ba1f 252->257 256->272 259 1000ba21-1000ba54 call 100038e0 call 10005460 call 10003988 257->259 260 1000ba59-1000ba5c 257->260 259->272 267 1000ba93-1000ba96 260->267 268 1000ba5e-1000ba91 call 100038e0 call 10005324 call 10003988 260->268 271 1000ba98-1000bab0 call 10005638 call 10003a34 267->271 267->272 268->272 271->272 304 1000bab2-1000bae8 call 10005638 call 100038e0 call 100039ec 271->304 308 1000bb5a-1000bb79 call 10003988 call 1000390c DeleteFileW 272->308 309 1000bb1d-1000bb58 call 10005324 call 100038e0 call 100039ec 272->309 304->272 327 1000bb7e-1000bbaf call 1000391c call 1000390c * 2 call 10005eb4 308->327 309->327 314->250 327->213 344 1000bbb1-1000bbb4 327->344 345 1000bbb6-1000bbc9 ShellExecuteW 344->345 346 1000bbcb-1000bbcd 344->346 345->213 346->213 347 1000bbcf-1000bbdd ShellExecuteW 346->347 347->213
                  APIs
                    • Part of subcall function 10003770: SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 1000BBC4
                    • Part of subcall function 1000553C: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000001,?,00000000,10005628,?,1000F834,?), ref: 10005591
                    • Part of subcall function 1000553C: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,10005628,?,1000F834,?), ref: 100055B5
                    • Part of subcall function 1000553C: RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001), ref: 100055E6
                    • Part of subcall function 1000553C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,10005628,?,1000F834), ref: 10005600
                    • Part of subcall function 1000577C: RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 100057C2
                    • Part of subcall function 1000577C: RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057EE
                    • Part of subcall function 1000577C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057FD
                  • DeleteFileW.KERNEL32(00000000,00000004,00000000,00000002,00000000,00000002,00000000,?,00000000,1000BC5D,?,1000F834,00000000,00000000,000002C4,00000000), ref: 1000BB79
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 1000BBDD
                    • Part of subcall function 100053D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 10005406
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Value$CloseExecuteQueryShell$CreateDeleteDirectoryFileFreeOpenStringSystem
                  • String ID: .exe$.xtr$BINDER$SOFTWARE\$open
                  • API String ID: 3529233218-3085899294
                  • Opcode ID: 0a22a47b740f272aa9815302f1ca917ca28341e751ca6317fe122055c7ff1c0c
                  • Instruction ID: e2e431fa4438d6138b358157023902ea7bce804184865157e4dc89de6df5abab
                  • Opcode Fuzzy Hash: 0a22a47b740f272aa9815302f1ca917ca28341e751ca6317fe122055c7ff1c0c
                  • Instruction Fuzzy Hash: 33C11C38A005199BFB25DB54CC82BCFB3B9EB84381F5080B5B509AB249DE75FE858F51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • GetTempPathW.KERNEL32(00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 100054D4
                  • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000), ref: 10005515
                  • CloseHandle.KERNEL32(00000000,?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 1000551B
                  • FindExecutableW.SHELL32(?,00000000,?), ref: 10005528
                  • DeleteFileW.KERNEL32(?,00000000,?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe), ref: 1000552E
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseCreateDeleteExecutableFindHandlePathTemp
                  • String ID:
                  • API String ID: 3048815070-0
                  • Opcode ID: 957bafadc8339fc7e9c53daa970423df76f48532bb4bd51b0a326c54caf883da
                  • Instruction ID: 3ea9f2177f4edda36d5c03afde6c78b2b523ab1dccb69f8e5379325d0c4c700b
                  • Opcode Fuzzy Hash: 957bafadc8339fc7e9c53daa970423df76f48532bb4bd51b0a326c54caf883da
                  • Instruction Fuzzy Hash: B9F0A4B56453806FF311D7B4EC87FCB3B98CB01390F154462B240EA1EBEDA0B80483AA
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • GetTempPathW.KERNEL32(00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000,00000000,00000000,wzk5VL6RM0QU9blk), ref: 100054D4
                  • CreateFileW.KERNEL32(?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A,00000000), ref: 10005515
                  • CloseHandle.KERNEL32(00000000,?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 1000551B
                  • FindExecutableW.SHELL32(?,00000000,?), ref: 10005528
                  • DeleteFileW.KERNEL32(?,00000000,?,40000000,00000002,00000000,00000002,00000080,00000000,00000104,?,1000F834,00000000,1000D64A,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe), ref: 1000552E
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseCreateDeleteExecutableFindHandlePathTemp
                  • String ID:
                  • API String ID: 3048815070-0
                  • Opcode ID: d6f59c1516086c58ca134ac9e9af6d26f027bd27afbd4c33f68de5c84c349836
                  • Instruction ID: b8191a8fbfdb6de079f1d7f918beb96f752e281eea5dde0cd3b62906432631ca
                  • Opcode Fuzzy Hash: d6f59c1516086c58ca134ac9e9af6d26f027bd27afbd4c33f68de5c84c349836
                  • Instruction Fuzzy Hash: 3BF030B96413147BF210E7B4EC87FDB369CDB407D0F214521B244EA1DAEEA1BD4486EA
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                    • Part of subcall function 10003C28: SysAllocStringLen.OLEAUT32(CONFIG,?), ref: 10003C36
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,00000001,?,00000000,10005628,?,1000F834,?), ref: 10005591
                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,10005628,?,1000F834,?), ref: 100055B5
                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001), ref: 100055E6
                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,?,80000001,00000000,00000000,00000001,?,00000000,10005628,?,1000F834), ref: 10005600
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocQueryStringValue$CloseOpen
                  • String ID:
                  • API String ID: 1380265509-0
                  • Opcode ID: 44f5328e4876b6f52479c3c45a49cad434a2d2e4ded6db1d1893a13467945e67
                  • Instruction ID: 9e8535e9bd190b0497b11441725f9f23fe9a8eb8553ebcc7748c6e293a187153
                  • Opcode Fuzzy Hash: 44f5328e4876b6f52479c3c45a49cad434a2d2e4ded6db1d1893a13467945e67
                  • Instruction Fuzzy Hash: 3621FC75A04618ABFB01DBA8CC82EAF77ECEF44280F518561B504E7259EB71EE048B55
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 397 10005eb4-10005ed9 CreateFileW 398 10005f0a-10005f17 CloseHandle 397->398 399 10005edb-10005edf 397->399 400 10005ee1-10005ee5 399->400 401 10005ef3-10005f09 WriteFile 399->401 400->401 402 10005ee7-10005eee SetFilePointer 400->402 401->398 402->401
                  APIs
                  • CreateFileW.KERNEL32(00000000,40000000,00000002,00000000,00000002,00000000,00000000,?,1000F834,?,?,?,1000BB19,00000004,00000000,00000002), ref: 10005ECF
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,?,1000F834,?), ref: 10005EEE
                  • WriteFile.KERNEL32(00000000,1000BCB8,?,?,00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,?,1000F834,?), ref: 10005EFF
                  • CloseHandle.KERNEL32(00000000,00000000,40000000,00000002,00000000,00000002,00000000,00000000,?,1000F834,?,?,?,1000BB19,00000004,00000000), ref: 10005F0B
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseCreateHandlePointerWrite
                  • String ID:
                  • API String ID: 3604237281-0
                  • Opcode ID: 15ac5577d5dae7d4aec97f1a3cb8dd2b14689dc654f3c78174f220ac4ac4aebd
                  • Instruction ID: e4f3c4844a55c36be20b49d11d00148b33621b8e0b4bed1061d4f26ea208953b
                  • Opcode Fuzzy Hash: 15ac5577d5dae7d4aec97f1a3cb8dd2b14689dc654f3c78174f220ac4ac4aebd
                  • Instruction Fuzzy Hash: 2CF0F6762413157DF620D965AC87F9B624CDB41BF5F214236F614A90C0CAA16E0582A9
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                  • SHGetMalloc.SHELL32(00000000), ref: 100060D4
                  • SHGetSpecialFolderLocation.SHELL32(00000000,0000001A,?,00000000,1000616E,?,00000000,1000618B,?,1000F834,1000F834,?,?,10005673,?,1000D2C2), ref: 1000610A
                  • SHGetPathFromIDListW.SHELL32(?,?), ref: 10006123
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FolderFromListLocationMallocPathSpecial
                  • String ID:
                  • API String ID: 628029987-0
                  • Opcode ID: f6cc65bf62ea17e1061210d62eb0f9c292ca39f545557847811f4f652a5415d6
                  • Instruction ID: f5f1894c3c3aa185a840a3eadd195327b621776b8329dab3f1fb33b6c646e1e3
                  • Opcode Fuzzy Hash: f6cc65bf62ea17e1061210d62eb0f9c292ca39f545557847811f4f652a5415d6
                  • Instruction Fuzzy Hash: C021AEB5904108AFEB11DAA4CC54ADF77BEEB4D380F6144B0B905E360ADA35AF19CA21
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  APIs
                    • Part of subcall function 10003C28: SysAllocStringLen.OLEAUT32(CONFIG,?), ref: 10003C36
                  • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 100057C2
                  • RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057EE
                  • RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057FD
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocCloseCreateStringValue
                  • String ID:
                  • API String ID: 2140091102-0
                  • Opcode ID: 8386abb8985e96b7e742ca73356f96697864f8e82dd8d2b35a464892efa59d00
                  • Instruction ID: 0dd5ed0a943e6cb984665ac1d2623c356232ef0b36590c9567a6f14ca7775770
                  • Opcode Fuzzy Hash: 8386abb8985e96b7e742ca73356f96697864f8e82dd8d2b35a464892efa59d00
                  • Instruction Fuzzy Hash: 3511DDB9904108BFE741DBA4DC42D9F77ECDF04290F518575B914E7215EB70AE109B50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 446 10003c28-10003c2c 447 10003c46 446->447 448 10003c2e-10003c3e SysAllocStringLen 446->448 449 10003740 448->449 450 10003c44 448->450 449->446 450->447
                  APIs
                  • SysAllocStringLen.OLEAUT32(CONFIG,?), ref: 10003C36
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocString
                  • String ID: CONFIG
                  • API String ID: 2525500382-611510522
                  • Opcode ID: 734bba22bcabf0676f6a1f2d94e45a7007c05a1f4cc569600fc17bea491f4fa7
                  • Instruction ID: 25e1bc4a7362bba16a589b72a0d6fee5176ce5d44e135c61f892b3ac78b80433
                  • Opcode Fuzzy Hash: 734bba22bcabf0676f6a1f2d94e45a7007c05a1f4cc569600fc17bea491f4fa7
                  • Instruction Fuzzy Hash: B0D012F82045025A779DCE18896596BB3EFDBC25C1361C258A501DE14CDB31E841DB20
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 451 10003158-1000316f 452 10003171-10003174 451->452 453 10003187-1000318e 451->453 452->453 454 10003176-10003185 452->454 455 10003190-1000319c call 10003040 call 100030cc 453->455 456 100031a1-100031a5 453->456 454->453 455->456 458 100031b1-100031ba call 10002f24 456->458 459 100031a7-100031aa 456->459 466 100031c1-100031c6 458->466 467 100031bc-100031bf 458->467 459->458 460 100031ac-100031ae 459->460 460->458 469 100031e2-100031eb call 10002efc 466->469 470 100031c8-100031d6 call 1000466c 466->470 467->466 467->469 476 100031f0-100031f4 469->476 477 100031ed 469->477 470->469 475 100031d8-100031da 470->475 475->469 480 100031dc-100031dd FreeLibrary 475->480 478 100031f6 call 1000309c 476->478 479 100031fb-100031fe 476->479 477->476 478->479 482 10003200-10003207 479->482 483 10003217 479->483 480->469 484 10003209 482->484 485 1000320f-10003212 ExitProcess 482->485 484->485
                  APIs
                  • FreeLibrary.KERNEL32(10000000,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000,10002538,?,1000D702,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 100031DD
                  • ExitProcess.KERNEL32(00000000,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000,10002538,?,1000D702,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 10003212
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitFreeLibraryProcess
                  • String ID:
                  • API String ID: 1404682716-0
                  • Opcode ID: a7d26fcc6f4fce9ecc30ffe483834d278041aa4daacdb7ce10931836dbac7f8e
                  • Instruction ID: 102873f78adbb93bbd2a11590cb18782e29a3d6c26b998e20b0a0626f3baee5f
                  • Opcode Fuzzy Hash: a7d26fcc6f4fce9ecc30ffe483834d278041aa4daacdb7ce10931836dbac7f8e
                  • Instruction Fuzzy Hash: 132148B49002819BFB52DB64C48879677EDEB093D0F26C569D8448B18ED775DCC4C791
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 486 10003150-1000316f 488 10003171-10003174 486->488 489 10003187-1000318e 486->489 488->489 490 10003176-10003185 488->490 491 10003190-1000319c call 10003040 call 100030cc 489->491 492 100031a1-100031a5 489->492 490->489 491->492 494 100031b1-100031ba call 10002f24 492->494 495 100031a7-100031aa 492->495 502 100031c1-100031c6 494->502 503 100031bc-100031bf 494->503 495->494 496 100031ac-100031ae 495->496 496->494 505 100031e2-100031eb call 10002efc 502->505 506 100031c8-100031d6 call 1000466c 502->506 503->502 503->505 512 100031f0-100031f4 505->512 513 100031ed 505->513 506->505 511 100031d8-100031da 506->511 511->505 516 100031dc-100031dd FreeLibrary 511->516 514 100031f6 call 1000309c 512->514 515 100031fb-100031fe 512->515 513->512 514->515 518 10003200-10003207 515->518 519 10003217 515->519 516->505 520 10003209 518->520 521 1000320f-10003212 ExitProcess 518->521 520->521
                  APIs
                  • FreeLibrary.KERNEL32(10000000,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000,10002538,?,1000D702,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 100031DD
                  • ExitProcess.KERNEL32(00000000,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000,10002538,?,1000D702,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 10003212
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitFreeLibraryProcess
                  • String ID:
                  • API String ID: 1404682716-0
                  • Opcode ID: 0eb6f4655f148300ca2f24b40a13f7269e70753ec68d107d5bfe6d84152a04b1
                  • Instruction ID: fe416cb812802e2425b92288dcf65fb30cec29a5b1ace6356a2caf233bfd9b77
                  • Opcode Fuzzy Hash: 0eb6f4655f148300ca2f24b40a13f7269e70753ec68d107d5bfe6d84152a04b1
                  • Instruction Fuzzy Hash: CA2157B49002819AFB52DB60C4887927BE9EF093D0F26C9A9D8448A18ED774DCC4CB52
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 522 10003154-1000316f 523 10003171-10003174 522->523 524 10003187-1000318e 522->524 523->524 525 10003176-10003185 523->525 526 10003190-1000319c call 10003040 call 100030cc 524->526 527 100031a1-100031a5 524->527 525->524 526->527 529 100031b1-100031ba call 10002f24 527->529 530 100031a7-100031aa 527->530 537 100031c1-100031c6 529->537 538 100031bc-100031bf 529->538 530->529 531 100031ac-100031ae 530->531 531->529 540 100031e2-100031eb call 10002efc 537->540 541 100031c8-100031d6 call 1000466c 537->541 538->537 538->540 547 100031f0-100031f4 540->547 548 100031ed 540->548 541->540 546 100031d8-100031da 541->546 546->540 551 100031dc-100031dd FreeLibrary 546->551 549 100031f6 call 1000309c 547->549 550 100031fb-100031fe 547->550 548->547 549->550 553 10003200-10003207 550->553 554 10003217 550->554 551->540 555 10003209 553->555 556 1000320f-10003212 ExitProcess 553->556 555->556
                  APIs
                  • FreeLibrary.KERNEL32(10000000,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000,10002538,?,1000D702,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 100031DD
                  • ExitProcess.KERNEL32(00000000,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000,10002538,?,1000D702,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe,0000020A), ref: 10003212
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitFreeLibraryProcess
                  • String ID:
                  • API String ID: 1404682716-0
                  • Opcode ID: f029aa4d048ab71b3d48e2163f45d484fdec98b6e81d7e04a45f41dc6beeb9e9
                  • Instruction ID: 0923f5ad4ec0768f18e91c29f3e5e862ef011e1a732e010652329f9221a0f365
                  • Opcode Fuzzy Hash: f029aa4d048ab71b3d48e2163f45d484fdec98b6e81d7e04a45f41dc6beeb9e9
                  • Instruction Fuzzy Hash: D7215BB49002819BFB52DF60C4887967BEDEF093D0F22C569D8448618ED775DCC4CB52
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 557 10009950-100099a4 call 100050d8 CreateProcessW 560 100099b4-100099bf 557->560 561 100099a6-100099af Sleep 557->561 561->560
                  APIs
                  • CreateProcessW.KERNEL32 ref: 1000999D
                  • Sleep.KERNEL32(00000064,00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?,1000F834,1000F834,00000000,1000D68D,00000000), ref: 100099AF
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateProcessSleep
                  • String ID:
                  • API String ID: 3229676899-0
                  • Opcode ID: bca0b144e135752a1d5e6e13312447c91aa1364c1872f8c890ab86c12d918bbf
                  • Instruction ID: 37df1048d1a9e356d2120e553cad0eb1a5fc8c22ebf76e4491bd2cded27ec310
                  • Opcode Fuzzy Hash: bca0b144e135752a1d5e6e13312447c91aa1364c1872f8c890ab86c12d918bbf
                  • Instruction Fuzzy Hash: 05F089B63843442BF330D694DC86FEB739CEB84790F110539BB88DA1C1DAB5A91583B6
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  • SysAllocStringLen.OLEAUT32(?,00000105), ref: 1000386F
                  • SysFreeString.OLEAUT32 ref: 10003881
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: String$Free$Alloc
                  • String ID:
                  • API String ID: 986138563-0
                  • Opcode ID: 21118d2c77f2e3f9fe37a42b328e85e62b155979c5758a64c4b92a8b62830715
                  • Instruction ID: ca28794199431f72530e799d36250414a245c489da467331e40bdcc928d85e60
                  • Opcode Fuzzy Hash: 21118d2c77f2e3f9fe37a42b328e85e62b155979c5758a64c4b92a8b62830715
                  • Instruction Fuzzy Hash: 6BC08CFC1052022CBF0AAB3148859BB639CEF801C13408068BA04C4008D634E8814020
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,10001661), ref: 10001387
                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,10001661), ref: 100013AE
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Virtual$AllocFree
                  • String ID:
                  • API String ID: 2087232378-0
                  • Opcode ID: f06ee548b5ebffe1745c786babf5b5d23a6d64f926da9f609fe49afe4c263715
                  • Instruction ID: a9c88282e432f8f48e60550f2442f7a71b9eebfe68f090cfd9eaf30bd27f6b92
                  • Opcode Fuzzy Hash: f06ee548b5ebffe1745c786babf5b5d23a6d64f926da9f609fe49afe4c263715
                  • Instruction Fuzzy Hash: 82F0A7B6B0062027F730C9694C81BCA66C5DF86BE1F154270FF48EF7CEDA619C0082A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 1000379B
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeString
                  • String ID:
                  • API String ID: 3341692771-0
                  • Opcode ID: a97da6d1a166e53047aad3afbfbd3a8eda8bad4dfe458de0bb8b2fbaa1060f86
                  • Instruction ID: c2b807945fbd858067c7052735d838f70a134ef64bf736acf42af14dc62dc520
                  • Opcode Fuzzy Hash: a97da6d1a166e53047aad3afbfbd3a8eda8bad4dfe458de0bb8b2fbaa1060f86
                  • Instruction Fuzzy Hash: 64C012F66506200BFB62CBA99CC0B8763CCDB892E5F1541A1A518DB208E660AC0086A2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CreateMutexW.KERNEL32(?,?,?,?,1000D54A,00000000,00000000,wzk5VL6RM0QU9blk), ref: 10004E06
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CreateMutex
                  • String ID:
                  • API String ID: 1964310414-0
                  • Opcode ID: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                  • Instruction ID: 5a3873c4f99191ebd0c5874248a48e85116967648e1c4cce01420d804b7247f1
                  • Opcode Fuzzy Hash: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                  • Instruction Fuzzy Hash: 20C012B71A024CAB8B00EEA9CC06D9B33DCAB28609B008825B928CB100C539E5909B60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetFileAttributesW.KERNEL32(00000000,100056A6,1000F834,1000F834,?,1000D2F8,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005679
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: fe0dc61edb0e7cc40dd00668538b564961092fac01b342148f47dbe8c26fd250
                  • Instruction ID: ea5e7307e224a2362f62b937032a713fdd445899dab5aa11519bd1f809b1bc4b
                  • Opcode Fuzzy Hash: fe0dc61edb0e7cc40dd00668538b564961092fac01b342148f47dbe8c26fd250
                  • Instruction Fuzzy Hash: 7AB012A88012410C7D40D175080506B31C4EB911F7BE71F81E874C34DDDF17940B2820
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 1000374F
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocString
                  • String ID:
                  • API String ID: 2525500382-0
                  • Opcode ID: c3d9d0a666eff376f821b6af0d3cd74f414e7a9998069cdbae396ed4eef14e50
                  • Instruction ID: 594f7db3346f59ee2b746a14ae0536c80aa61ded5ebc518595aa97b66a28efc9
                  • Opcode Fuzzy Hash: c3d9d0a666eff376f821b6af0d3cd74f414e7a9998069cdbae396ed4eef14e50
                  • Instruction Fuzzy Hash: A9B012F820C70310FEAAD1210D517B703CCCB004C3F825014EF08C40CDDA50D8025031
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SysFreeString.OLEAUT32(00000000), ref: 10003767
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeString
                  • String ID:
                  • API String ID: 3341692771-0
                  • Opcode ID: c84231d939c3f1dede93ead9e794aca24fb850687463f20dd1216931c1658ed6
                  • Instruction ID: 74cff04a054d399575dcd112ce88993749322833dca3bd7758bf9d1364754a37
                  • Opcode Fuzzy Hash: c84231d939c3f1dede93ead9e794aca24fb850687463f20dd1216931c1658ed6
                  • Instruction Fuzzy Hash: C6A022FC000B0308BF0FB32C00A20A333BAFFC00C03C2C0A832080A00E8E3BC8008020
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000), ref: 10001498
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeVirtual
                  • String ID:
                  • API String ID: 1263568516-0
                  • Opcode ID: 10fe2dbb55c9af0552f02238f08e03cb0f8d1b4e9af3fd0ffb6fb2eede832607
                  • Instruction ID: 3fa41a510b944b51636159baf3a22d7c595f027a87933030a07595b3af302d5b
                  • Opcode Fuzzy Hash: 10fe2dbb55c9af0552f02238f08e03cb0f8d1b4e9af3fd0ffb6fb2eede832607
                  • Instruction Fuzzy Hash: FF2108706087519FE300CF19C8C0A9ABBE4EF847A0F15C929E5988B369D774EC41CB96
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 10001559
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 658d5346f56e2b90820d1a4238b762dd8e40d303793816f207723b6d5c2275ec
                  • Instruction ID: 376a20137c8c7a1c0fe805d4ca5c7b4e53bfabd2decc6611af020c1a5c038b4e
                  • Opcode Fuzzy Hash: 658d5346f56e2b90820d1a4238b762dd8e40d303793816f207723b6d5c2275ec
                  • Instruction Fuzzy Hash: 42117076A05B029BE310DF19CC80A9AB7E1EBC47D2F15C52CE6894B759D630EC408A81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,00000000,00004003,100017E7), ref: 100015DA
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeVirtual
                  • String ID:
                  • API String ID: 1263568516-0
                  • Opcode ID: 19ed765fabffe9195ef8269cde91d8c30df923ae3bcc911b56444050f0160e6e
                  • Instruction ID: e66e407dd1e15fa3fc9a28e351f6f3ad1c49e8eb648c93e6ec0b59d0a763a2f7
                  • Opcode Fuzzy Hash: 19ed765fabffe9195ef8269cde91d8c30df923ae3bcc911b56444050f0160e6e
                  • Instruction Fuzzy Hash: 7901F276609B508FE310DF68CCC0A9A77E4DBC43E6F16053CDA859B749D732AC0087A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Malloc
                  • String ID:
                  • API String ID: 2696272793-0
                  • Opcode ID: e494b0dbbd17313aec99b6fdc899f248a05a96dc61f52493615a425915e08986
                  • Instruction ID: 2b23affcbc4175e08e38b0563d1324aa0b8922ef3a41ef4a7c7d2d78b35e8f64
                  • Opcode Fuzzy Hash: e494b0dbbd17313aec99b6fdc899f248a05a96dc61f52493615a425915e08986
                  • Instruction Fuzzy Hash: 06A0029574220407EB50D9FE98C174782CBA78D351FB04079710DC734BD955AC562136
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00008000,00000000,10008BA5), ref: 10008751
                  • VirtualFree.KERNEL32(?,00000000,00008000,00000000,10008BA5,?,?,?,0000002E,00000000,00000000), ref: 100085B7
                    • Part of subcall function 10003770: SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Free$FileStringVirtualWrite
                  • String ID: $ --- $</font>$<FONT COLOR="blue">[$<FONT COLOR="red">[Clipboard$<FONT COLOR="red">[Clipboard End]</font>$LastSize$SOFTWARE\$]</font>$qualquercoisarsrsr$temp
                  • API String ID: 84115566-3009520543
                  • Opcode ID: e238ab7fd7b67536d2de49d1c07564a4c6aee27f7ac160145bbdbd2866874383
                  • Instruction ID: 057d20e264fa80afaee32c8a6c883f4daf1d9cc34b90863f49a2566050bc1c08
                  • Opcode Fuzzy Hash: e238ab7fd7b67536d2de49d1c07564a4c6aee27f7ac160145bbdbd2866874383
                  • Instruction Fuzzy Hash: 6DF16F74A00219ABFB51DB64CC81FDE73B9FB083C0F508065F148A72ADDB75AE858B65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CreateProcessW.KERNEL32 ref: 1000BE3A
                  • Sleep.KERNEL32(000000C8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 1000BE4C
                  • GetThreadContext.KERNEL32(?,00010007,000000C8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 1000BE5F
                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,00010007,000000C8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 1000BE7F
                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 1000BE8F
                  • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000004,?,?,?,00000004,00000000,?,00010007,000000C8,00000000,00000000,00000000), ref: 1000BEB0
                  • WriteProcessMemory.KERNEL32(?,00000000,1000C797,?,00000000,?,?,?,00003000,00000004,?,?,?,00000004,00000000,?), ref: 1000BECF
                  • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 1000BF46
                  • VirtualProtectEx.KERNEL32(?,?,?,00000040,?,?,?,?,?,?), ref: 1000BF69
                  • WriteProcessMemory.KERNEL32(?,?,00000000,00000004,00000000,?,00000000,1000C797,?,00000000,?,?,?,00003000,00000004,?), ref: 1000BF91
                  • SetThreadContext.KERNEL32(?,00010007,?,?,00000000,00000004,00000000,?,00000000,1000C797,?,00000000,?,?,?,00003000), ref: 1000BFBE
                  • ResumeThread.KERNEL32(?,?,00010007,?,?,00000000,00000004,00000000,?,00000000,1000C797,?,00000000,?,?,?), ref: 1000BFD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$Memory$ThreadWrite$ContextVirtual$AllocCreateProtectReadResumeSectionSleepUnmapView
                  • String ID: D
                  • API String ID: 251557703-2746444292
                  • Opcode ID: ddef249305afe7fb47cb9d0f556ca1214483f34f73db6a87cab3b00bcfcfae37
                  • Instruction ID: 51d3043d039fb927f3967ecafbc59ab6c1ff4cf1235e2731e9b23ce8e7e6b630
                  • Opcode Fuzzy Hash: ddef249305afe7fb47cb9d0f556ca1214483f34f73db6a87cab3b00bcfcfae37
                  • Instruction Fuzzy Hash: A8916FB5904259AFEB51DBA4CC81FEEB7BCEB49340F1140E6F208E7156DA34AE458B20
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10003C28: SysAllocStringLen.OLEAUT32(CONFIG,?), ref: 10003C36
                  • CreateProcessW.KERNEL32 ref: 1000BE3A
                  • Sleep.KERNEL32(000000C8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 1000BE4C
                  • GetThreadContext.KERNEL32(?,00010007,000000C8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 1000BE5F
                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000,?,00010007,000000C8,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000), ref: 1000BE7F
                  • NtUnmapViewOfSection.NTDLL(?,?), ref: 1000BE8F
                  • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000004,?,?,?,00000004,00000000,?,00010007,000000C8,00000000,00000000,00000000), ref: 1000BEB0
                  • WriteProcessMemory.KERNEL32(?,00000000,1000C797,?,00000000,?,?,?,00003000,00000004,?,?,?,00000004,00000000,?), ref: 1000BECF
                  • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 1000BF46
                  • VirtualProtectEx.KERNEL32(?,?,?,00000040,?,?,?,?,?,?), ref: 1000BF69
                  • WriteProcessMemory.KERNEL32(?,?,00000000,00000004,00000000,?,00000000,1000C797,?,00000000,?,?,?,00003000,00000004,?), ref: 1000BF91
                  • SetThreadContext.KERNEL32(?,00010007,?,?,00000000,00000004,00000000,?,00000000,1000C797,?,00000000,?,?,?,00003000), ref: 1000BFBE
                  • ResumeThread.KERNEL32(?,?,00010007,?,?,00000000,00000004,00000000,?,00000000,1000C797,?,00000000,?,?,?), ref: 1000BFD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtual$CreateProtectReadResumeSectionSleepStringUnmapView
                  • String ID: D
                  • API String ID: 3069046386-2746444292
                  • Opcode ID: 5631d4e2f2f3d5cc413d0a5eaa7ab72704478a6d10640b3fbfc5c98150998316
                  • Instruction ID: 773f2633af5c966dbae7503bb26a44348cd9fcb95ad73bfc51fdb85d8e92df93
                  • Opcode Fuzzy Hash: 5631d4e2f2f3d5cc413d0a5eaa7ab72704478a6d10640b3fbfc5c98150998316
                  • Instruction Fuzzy Hash: A971DAB5A00119AFEB60DB98CD81FEEB3FCEB48340F5144A5F608E7245DA74AE458F64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetKeyState.USER32(00000014), ref: 10006D09
                  • GetKeyState.USER32(00000010), ref: 10006D16
                  • GetKeyState.USER32(00000014), ref: 10006D26
                  • GetKeyState.USER32(00000010), ref: 10006D33
                  • GetKeyState.USER32(00000014), ref: 10006D43
                  • GetKeyState.USER32(00000010), ref: 10006D50
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: State
                  • String ID:
                  • API String ID: 1649606143-0
                  • Opcode ID: 6918d53d3d07aab4c0cd6e783a8e12689080c07576cae801b53ea161e8d972bc
                  • Instruction ID: d6486f2fec8aba8f3b5500d340924e9af812674e08ffb561a2d1824f8f856f0b
                  • Opcode Fuzzy Hash: 6918d53d3d07aab4c0cd6e783a8e12689080c07576cae801b53ea161e8d972bc
                  • Instruction Fuzzy Hash: 6EF01D2CF95A4728FD90E2A04D527DD1152CF187C6FA0802AEA802D09E98825AC630FB
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetKeyboardState.USER32(?,00000000,10008123), ref: 1000808A
                  • GetForegroundWindow.USER32(?,00000000,10008123), ref: 1000808F
                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 10008097
                  • GetKeyboardLayout.USER32(00000000), ref: 1000809F
                  • VirtualAlloc.KERNEL32(00000000,0000010C,00001000,00000040,?,00000000,10008123), ref: 100080C7
                  • SendMessageA.USER32 ref: 100080F7
                  • CallNextHookEx.USER32 ref: 1000811D
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: KeyboardWindow$AllocCallForegroundHookLayoutMessageNextProcessSendStateThreadVirtual
                  • String ID:
                  • API String ID: 2475829859-0
                  • Opcode ID: cfb8c2f6c07dd6c8c12c5b73d6607ef2dbe25eb77fb659a241c05aedeeedaf23
                  • Instruction ID: 27a6fad57be863aabbe855ec58336ce39a4f816ab1f20d22dae40b31cdfd5c32
                  • Opcode Fuzzy Hash: cfb8c2f6c07dd6c8c12c5b73d6607ef2dbe25eb77fb659a241c05aedeeedaf23
                  • Instruction Fuzzy Hash: 412151B4600208AFFB51DF64CC82FDB37A8EB4C781F004524FA44A7255DA75AE858FA4
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 10006907
                  • InternetConnectW.WININET(00000000,?,00000015,?,?,00000001,08000000,00000000), ref: 10006923
                  • FtpSetCurrentDirectoryW.WININET(00000000,?), ref: 1000692F
                  • WaitForSingleObject.KERNEL32(00000001,000000FF), ref: 10006940
                  • FtpPutFileW.WININET(00000000,?,?,00000002,00000000), ref: 10006952
                  • InternetCloseHandle.WININET(00000000), ref: 1000695E
                  • InternetCloseHandle.WININET(00000000), ref: 10006964
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Internet$CloseHandle$ConnectCurrentDirectoryFileObjectOpenSingleWait
                  • String ID:
                  • API String ID: 140008950-0
                  • Opcode ID: 986aac2d3270ff8f09d33a4b0a939757c489752215f58343083dd92cbf4cca8d
                  • Instruction ID: cbc3213e50a342726adeb0dcb95658ed0f55962254ebdcc4bae47dda2437ff56
                  • Opcode Fuzzy Hash: 986aac2d3270ff8f09d33a4b0a939757c489752215f58343083dd92cbf4cca8d
                  • Instruction Fuzzy Hash: D80175767853047EF710DAA84C83FBE629CDB49BA5F300629F614EB1C1D5B27D004665
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10003770: SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  • OpenClipboard.USER32(00000000), ref: 10006A07
                  • GetClipboardData.USER32 ref: 10006A24
                  • GlobalFix.KERNEL32 ref: 10006A48
                  • GlobalSize.KERNEL32(00000000), ref: 10006A53
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • GlobalUnWire.KERNEL32(00000000), ref: 10006AB9
                  • CloseClipboard.USER32(10006AE8,?,00000000,10006B04,?,?,?), ref: 10006AD7
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: ClipboardGlobal$String$AllocCloseDataFreeOpenSizeWire
                  • String ID:
                  • API String ID: 1300121464-0
                  • Opcode ID: 064efa2ddcbdc333166debe158bc30ea9b511c389f605a726f971f8daa8baf48
                  • Instruction ID: 6c9ee2d81449cc0851c779360ccc62e81b10a1ab3d70038b93f0ad500b4e2f45
                  • Opcode Fuzzy Hash: 064efa2ddcbdc333166debe158bc30ea9b511c389f605a726f971f8daa8baf48
                  • Instruction Fuzzy Hash: D3310774A04644AFFB01DBA4CC52AAFB7E9EB4D380F6284B5F900E3749DB35AD00CA55
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100027DC: GetKeyboardType.USER32(00000000), ref: 100027E1
                    • Part of subcall function 100027DC: GetKeyboardType.USER32(00000001), ref: 100027ED
                  • GetCommandLineA.KERNEL32 ref: 10004BB3
                  • GetVersion.KERNEL32 ref: 10004BC7
                  • GetVersion.KERNEL32 ref: 10004BD8
                  • GetCurrentThreadId.KERNEL32 ref: 10004C14
                    • Part of subcall function 1000280C: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 1000282E
                    • Part of subcall function 1000280C: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,1000287D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 10002861
                    • Part of subcall function 1000280C: RegCloseKey.ADVAPI32(?,10002884,00000000,?,00000004,00000000,1000287D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 10002877
                  • GetThreadLocale.KERNEL32 ref: 10004BF4
                    • Part of subcall function 10004A84: GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,10004AEA), ref: 10004AAA
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: KeyboardLocaleThreadTypeVersion$CloseCommandCurrentInfoLineOpenQueryValue
                  • String ID:
                  • API String ID: 3734044017-0
                  • Opcode ID: 4a55a734a805fa50f35cfdecb007be50b81c5b88d7ec8d0924afd786aa6d3e41
                  • Instruction ID: b691414424a171523e6ed701ccaa2f926f8cba09af9fdddc6886d40973360df8
                  • Opcode Fuzzy Hash: 4a55a734a805fa50f35cfdecb007be50b81c5b88d7ec8d0924afd786aa6d3e41
                  • Instruction Fuzzy Hash: 600156F88013918AF750EFB08C863A93B60EB113C0F01852DD2404AA6FDFB95184EB6B
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • FindResourceW.KERNEL32(10000000,00000000,0000000A,1000F834,?,?,1000D1D5,00008007,00000000,1000D759,?,?,?,?,00000000,00000000), ref: 100051FF
                  • SizeofResource.KERNEL32(10000000,00000000,10000000,00000000,0000000A,1000F834,?,?,1000D1D5,00008007,00000000,1000D759), ref: 1000520D
                  • LoadResource.KERNEL32(10000000,00000000,10000000,00000000,10000000,00000000,0000000A,1000F834,?,?,1000D1D5,00008007,00000000,1000D759), ref: 1000521B
                  • LockResource.KERNEL32(00000000,10000000,00000000,10000000,00000000,10000000,00000000,0000000A,1000F834,?,?,1000D1D5,00008007,00000000,1000D759), ref: 10005223
                  • FreeResource.KERNEL32(00000000,00000000,10000000,00000000,10000000,00000000,10000000,00000000,0000000A,1000F834,?,?,1000D1D5,00008007,00000000,1000D759), ref: 10005237
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Resource$FindFreeLoadLockSizeof
                  • String ID:
                  • API String ID: 4159136517-0
                  • Opcode ID: 6f9064c725ce0eda676baacf6c63ec492ac870baedeada23c600b6ea1a41f5ea
                  • Instruction ID: 394ad428024afc6b979a81fc6034fab6802de57518f58b4d3ea2d93c6a88d4c5
                  • Opcode Fuzzy Hash: 6f9064c725ce0eda676baacf6c63ec492ac870baedeada23c600b6ea1a41f5ea
                  • Instruction Fuzzy Hash: 98F08CF63006512BF600D3F98CC1E3B62DDFB986C1B020024B608D721ADD29EC044364
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10003C28: SysAllocStringLen.OLEAUT32(CONFIG,?), ref: 10003C36
                  • URLDownloadToCacheFileW.URLMON(00000000,00000000,?,00000104,00000010,00000000), ref: 10005FD1
                  • CopyFileW.KERNEL32(?,00000000,00000000,00000000,10006016), ref: 10005FEC
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AllocCacheCopyDownloadString
                  • String ID:
                  • API String ID: 2397740412-0
                  • Opcode ID: 4a77a2e6e5b60fd12bd9e17b935437ef89a8161801deff5e08ca33a82e0ce24b
                  • Instruction ID: 518c37ad459ba6dfeec1cc82918b9415ec9692cdfa9117b24deab1163ccdcd4a
                  • Opcode Fuzzy Hash: 4a77a2e6e5b60fd12bd9e17b935437ef89a8161801deff5e08ca33a82e0ce24b
                  • Instruction Fuzzy Hash: 4D018474544208BEF711DB64CC82FEFBBECDB08780F904572F504E6196EB75AA549A50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetLocalTime.KERNEL32(?,00000000,10006CD2,?,?,?,?,00000000,00000000,0000003A,?,1000C3BA,?,.dat,?,1000C958), ref: 10006B42
                    • Part of subcall function 10003788: SysFreeString.OLEAUT32(?), ref: 1000379B
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeLocalStringTime
                  • String ID:
                  • API String ID: 4115487899-0
                  • Opcode ID: 080143b38f47a14bc7abd16a6aa459c922e841604fcb300ac30b8a9b522506b0
                  • Instruction ID: 6c50818c357f400c33ad67fb0aa65d9f8c3d174c8eb37c65fd316cc4577b83bf
                  • Opcode Fuzzy Hash: 080143b38f47a14bc7abd16a6aa459c922e841604fcb300ac30b8a9b522506b0
                  • Instruction Fuzzy Hash: E051F17890405DABFB05DB94CC41DFFB7BBEF89380FA08066F440B6259DE35AE458A60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 10006507
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: NtdllProc_Window
                  • String ID:
                  • API String ID: 4255912815-0
                  • Opcode ID: a36e2596e50cbdcff5ffa68e6a1e7b8638978eb7ec4bb7942f87b3b5f9b64d97
                  • Instruction ID: d91e40c9a86a1603bffb38651a5b716410016987c82cb3399e660d7322f9702c
                  • Opcode Fuzzy Hash: a36e2596e50cbdcff5ffa68e6a1e7b8638978eb7ec4bb7942f87b3b5f9b64d97
                  • Instruction Fuzzy Hash: 23014B7A80E3C55FC703DF7898A55413FB9AE5B24070F04D7E484CF0A3E6685858CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,10004AEA), ref: 10004AAA
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: InfoLocale
                  • String ID:
                  • API String ID: 2299586839-0
                  • Opcode ID: efe5643a6653c0d33cbe588f2399e79e61fc0be940d45b1ddb6cbc9784bd52bb
                  • Instruction ID: a6b1d0fb2cc725cd67dae8327f47cbfeb89b8e8f14ee4b1b67c3bb55e1ee9b21
                  • Opcode Fuzzy Hash: efe5643a6653c0d33cbe588f2399e79e61fc0be940d45b1ddb6cbc9784bd52bb
                  • Instruction Fuzzy Hash: F8F0C274A08209AFFB01DEA1CC51AEFB3BAFB85350F40C835E11066588EBB43A04C695
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 1000AF81
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: NtdllProc_Window
                  • String ID:
                  • API String ID: 4255912815-0
                  • Opcode ID: d3956dd715256d4decada7e69221bfc1ce5d5ef765fdf7dd91a78ac1ce545737
                  • Instruction ID: 8e78343bb29869cc51209ea075ef4b030323b4b60e46301b02e33cef73b8dc7b
                  • Opcode Fuzzy Hash: d3956dd715256d4decada7e69221bfc1ce5d5ef765fdf7dd91a78ac1ce545737
                  • Instruction Fuzzy Hash: 0DE0EDB67051905FA711CAAE98C486ABBEDDF8A19130981A6F548CB21AC664EC418760
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 10006507
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: NtdllProc_Window
                  • String ID:
                  • API String ID: 4255912815-0
                  • Opcode ID: 91a85faddc0a6b7c48ccd8513a21e82de454515e62290299adcaadae15e2c70d
                  • Instruction ID: 436466b3821b95b6b86dd239864fdc8ccfeb13c66957006ad6da2fca92e58a32
                  • Opcode Fuzzy Hash: 91a85faddc0a6b7c48ccd8513a21e82de454515e62290299adcaadae15e2c70d
                  • Instruction Fuzzy Hash: A1D002BA20420DAF8B40DEDDEC81E9B33ECAB0C650B008411BA18C7205CA70F9609B75
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryA.KERNEL32(advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000C9F9
                  • LoadLibraryA.KERNEL32(kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000CA03
                  • LoadLibraryA.KERNEL32(shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000CA0D
                  • LoadLibraryA.KERNEL32(mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000CA17
                  • LoadLibraryA.KERNEL32(version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000CA21
                  • LoadLibraryA.KERNEL32(comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000CA2B
                  • LoadLibraryA.KERNEL32(gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000,00000000), ref: 1000CA35
                  • LoadLibraryA.KERNEL32(opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009,00000000), ref: 1000CA3F
                  • LoadLibraryA.KERNEL32(user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B,?,?,?,?,00000009), ref: 1000CA49
                  • LoadLibraryA.KERNEL32(wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B), ref: 1000CA53
                  • LoadLibraryA.KERNEL32(msimg32.dll,wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B), ref: 1000CA5D
                  • LoadLibraryA.KERNEL32(shell32.dll,msimg32.dll,wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000CD6B), ref: 1000CA67
                  • Sleep.KERNEL32(000003E8,?,00000000,00000000,00000000,?,shell32.dll,msimg32.dll,wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll), ref: 1000CAC7
                  • SHDeleteValueW.SHLWAPI(80000001,00000000,00000000,000003E8,?,00000000,00000000,00000000,?,shell32.dll,msimg32.dll,wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll), ref: 1000CB2A
                    • Part of subcall function 10005E30: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E67
                    • Part of subcall function 10005E30: GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E71
                    • Part of subcall function 10005E30: ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E99
                    • Part of subcall function 10005E30: CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E9F
                  • SHDeleteKeyW.SHLWAPI(80000001,00000000,00000002,?,00000002,?,00000000,00000000,00000000,?,00001388,00000000,00000000,00000000,?), ref: 1000CC27
                  • GetLastError.KERNEL32(00000000,00000000,?), ref: 1000CCC2
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,?,00000002,?,80000001,00000000,00000002,?,00000002,?,00000000,00000000), ref: 1000CCCF
                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 1000CCE2
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,?), ref: 1000CCEA
                  • Sleep.KERNEL32(00001388,00000000,00000000,00000000,?), ref: 1000CCF4
                  • GetLastError.KERNEL32(00000000,00000000,?,00001388,00000000,00000000,00000000,?), ref: 1000CD0B
                  • ExitProcess.KERNEL32(00000000,00000000,00000000,?,00001388,00000000,open,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 1000CD19
                    • Part of subcall function 1000577C: RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 100057C2
                    • Part of subcall function 1000577C: RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057EE
                    • Part of subcall function 1000577C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057FD
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,?,00001388,00000000,00000000,00000000,?), ref: 1000CD24
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: LibraryLoad$Close$Handle$File$CreateDeleteErrorLastSleepValue$ExecuteExitProcessReadShellSize
                  • String ID: SOFTWARE\$ServerName$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath$advapi32.dll$comctl32.dll$gdi32.dll$jjj$kernel32.dll$mpr.dll$msimg32.dll$open$opengl32.dll$shell32.dll$user32.dll$version.dll$wintrust.dll
                  • API String ID: 570719760-3930227570
                  • Opcode ID: e5b13b107185a785ff7609e54e9964f14f8500de5215f434d3a790ea522c5d6f
                  • Instruction ID: 2f4b2620837c28cfdf5e49335ff29dada521f5c21c6ac21027946eb6f57ed48d
                  • Opcode Fuzzy Hash: e5b13b107185a785ff7609e54e9964f14f8500de5215f434d3a790ea522c5d6f
                  • Instruction Fuzzy Hash: 20911F78A4024DABFB01EBA4D882FDE7779EF442C1F118162F9046B28ECB75BD058765
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryA.KERNEL32(advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000,?,1000D71E,C:\Users\user\Desktop\gKi3fKq4Kh.exe,00000000,00000000,00000000,C:\Users\user\Desktop\gKi3fKq4Kh.exe), ref: 1000C0A8
                  • LoadLibraryA.KERNEL32(kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000,?,1000D71E,C:\Users\user\Desktop\gKi3fKq4Kh.exe,00000000,00000000,00000000), ref: 1000C0B2
                  • LoadLibraryA.KERNEL32(shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000,?,1000D71E,C:\Users\user\Desktop\gKi3fKq4Kh.exe,00000000,00000000), ref: 1000C0BC
                  • LoadLibraryA.KERNEL32(mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000,?,1000D71E,C:\Users\user\Desktop\gKi3fKq4Kh.exe,00000000), ref: 1000C0C6
                  • LoadLibraryA.KERNEL32(version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000,?,1000D71E,C:\Users\user\Desktop\gKi3fKq4Kh.exe), ref: 1000C0D0
                  • LoadLibraryA.KERNEL32(comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000,?,1000D71E), ref: 1000C0DA
                  • LoadLibraryA.KERNEL32(gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000), ref: 1000C0E4
                  • LoadLibraryA.KERNEL32(opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000,00000000), ref: 1000C0EE
                  • LoadLibraryA.KERNEL32(user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000,00000000), ref: 1000C0F8
                  • LoadLibraryA.KERNEL32(wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000,00000000), ref: 1000C102
                  • LoadLibraryA.KERNEL32(msimg32.dll,wintrust.dll,user32.dll,opengl32.dll,gdi32.dll,comctl32.dll,version.dll,mpr.dll,shell32.dll,kernel32.dll,advapi32.dll,00000000,1000C850,?,1000F834,00000000), ref: 1000C10C
                    • Part of subcall function 10006B14: GetLocalTime.KERNEL32(?,00000000,10006CD2,?,?,?,?,00000000,00000000,0000003A,?,1000C3BA,?,.dat,?,1000C958), ref: 10006B42
                    • Part of subcall function 1000577C: RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 100057C2
                    • Part of subcall function 1000577C: RegSetValueExW.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057EE
                    • Part of subcall function 1000577C: RegCloseKey.ADVAPI32(?,?,00000000,00000000,?,00000000,00000000,00000000,10005825,?,1000F834), ref: 100057FD
                    • Part of subcall function 10004DF0: CreateMutexW.KERNEL32(?,?,?,?,1000D54A,00000000,00000000,wzk5VL6RM0QU9blk), ref: 10004E06
                  • GetLastError.KERNEL32(00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?,1000C958,?,.cfg,?), ref: 1000C428
                  • ExitProcess.KERNEL32(00000000,00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?,1000C958,?,.cfg), ref: 1000C436
                  • SetFileAttributesW.KERNEL32(?,00000080,00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?,1000C958,?), ref: 1000C567
                  • DeleteFileW.KERNEL32(?,?,00000080,00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?,1000C958), ref: 1000C56D
                  • Sleep.KERNEL32(000001F4,?,?,00000080,00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?), ref: 1000C577
                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?,1000C958), ref: 1000C6C4
                  • CloseHandle.KERNEL32(?), ref: 1000C7A5
                  • ExitProcess.KERNEL32(00000000,?), ref: 1000C7AC
                    • Part of subcall function 100093E4: ShowWindow.USER32(00000000,00000000,00000000,100095DE,?,00000000,00000000,00000000,?,1000C659,00000000,00000000,?,00000002,?,?), ref: 10009443
                    • Part of subcall function 100093E4: SetFileAttributesW.KERNEL32(00000000,00000080,00000000,00000000,00000000,100095DE,?,00000000,00000000,00000000,?,1000C659,00000000,00000000,?,00000002), ref: 10009467
                    • Part of subcall function 100093E4: CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000,00000000,00000000,100095DE,?,00000000,00000000), ref: 10009486
                    • Part of subcall function 100093E4: GetFileSize.KERNEL32(00000000,00000000,00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000,00000000,00000000,100095DE), ref: 100094C3
                    • Part of subcall function 100093E4: SetFileAttributesW.KERNEL32(00000000,00000007,00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000,00000000,00000000,100095DE), ref: 10009554
                    • Part of subcall function 10003788: SysFreeString.OLEAUT32(?), ref: 1000379B
                    • Part of subcall function 10003770: SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: LibraryLoad$File$Attributes$Create$CloseExitFreeProcessString$DeleteErrorHandleLastLocalMutexShowSizeSleepTimeValueWindow
                  • String ID: .cfg$.dat$.xtr$InstalledServer$SOFTWARE\$ServerName$ServerStarted$\Microsoft\Windows\$advapi32.dll$comctl32.dll$gdi32.dll$kernel32.dll$mpr.dll$msimg32.dll$opengl32.dll$shell32.dll$user32.dll$version.dll$wintrust.dll
                  • API String ID: 3227317601-3293355523
                  • Opcode ID: 5b9d371332c0436a819d40e36f887bfd0ab1ce0b3426eda82bdb212bd3585989
                  • Instruction ID: 1bb01a822c3cd363219a61f58cecc4d3cd4d7df1aa5892b4b649a7b9097d74e2
                  • Opcode Fuzzy Hash: 5b9d371332c0436a819d40e36f887bfd0ab1ce0b3426eda82bdb212bd3585989
                  • Instruction Fuzzy Hash: 58128D7890025D9BEB21DB50CC82EDEB3B9EF84381F4080E5E5096B299DB71BF858F55
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetFileSize.KERNEL32(00000000,00000000,00000000,1000907B), ref: 10008DF5
                  • SendMessageA.USER32 ref: 10008EB2
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,0000C1AD,00000000,00000000,00000000,00000000,00000000,1000907B), ref: 10008EC7
                  • ReadFile.KERNEL32(00000000,?,-1000F6C4,?,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,0000C1AD,00000000,00000000,00000000), ref: 10008F0B
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00000000,?,-1000F6C4,?,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000), ref: 10008F1C
                  • SendMessageA.USER32 ref: 10008F36
                  • SetFileAttributesW.KERNEL32(?,00000080,</html>,100091AC,</body>,?,<html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000000), ref: 10008F65
                  • DeleteFileW.KERNEL32(?,?,00000080,</html>,100091AC,</body>,?,<html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002), ref: 10008F6B
                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000,?,?,00000080,</html>,100091AC,</body>,?,<html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>,00000000), ref: 10008F80
                  • WriteFile.KERNEL32(00000000,000000FF,00000002,?,00000000,?,40000000,00000000,00000000,00000002,00000000,00000000,?,?,00000080,</html>), ref: 10008FA1
                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,00000000,000000FF,00000002,?,00000000,?,40000000,00000000,00000000,00000002,00000000), ref: 10008FBC
                  • CloseHandle.KERNEL32(00000000,?,40000000,00000000,00000000,00000002,00000000,00000000,?,?,00000080,</html>,100091AC,</body>,?,<html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>), ref: 10008FC2
                  • DeleteFileW.KERNEL32(00000000,00000000,?,40000000,00000000,00000000,00000002,00000000,00000000,?,?,00000080,</html>,100091AC,</body>,?), ref: 10009053
                  Strings
                  • FTP, xrefs: 1000903A
                  • LastSize, xrefs: 10009028
                  • <html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>, xrefs: 10008F3B
                  • </html>, xrefs: 10008F4D
                  • </body>, xrefs: 10008F43
                  • SOFTWARE\, xrefs: 1000901B
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$DeleteMessagePointerSendWrite$AttributesCloseCreateHandleReadSize
                  • String ID: </body>$</html>$<html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>$FTP$LastSize$SOFTWARE\
                  • API String ID: 1838766879-265700797
                  • Opcode ID: 6afe5d7baa92ee49307d14607dcc6b54c298818535a995e093fc1311981f44f4
                  • Instruction ID: 9ae569672a167bc613e47318ba2929e521b2e386b238916fb1c1f90ba9e27590
                  • Opcode Fuzzy Hash: 6afe5d7baa92ee49307d14607dcc6b54c298818535a995e093fc1311981f44f4
                  • Instruction Fuzzy Hash: 2C814D74A00259AFFB10DFA8CC85FEE77F9FB08380F508119F544A72A9CB75A9458B64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryA.KERNEL32(URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A5A8
                  • LoadLibraryA.KERNEL32(shell32.dll,URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A5B2
                  • SetFileAttributesW.KERNEL32(00000000,00000080,shell32.dll,URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A5E7
                  • DeleteFileW.KERNEL32(00000000,00000002,00000000,00000000,00000080,shell32.dll,URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A6BA
                    • Part of subcall function 10005F88: URLDownloadToCacheFileW.URLMON(00000000,00000000,?,00000104,00000010,00000000), ref: 10005FD1
                    • Part of subcall function 10005F88: CopyFileW.KERNEL32(?,00000000,00000000,00000000,10006016), ref: 10005FEC
                  • DeleteFileW.KERNEL32(00000000,.functions,?,1000AA34,?,?,1000AA2C,?,http://), ref: 1000A915
                    • Part of subcall function 10005E30: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E67
                    • Part of subcall function 10005E30: GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E71
                    • Part of subcall function 10005E30: ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E99
                    • Part of subcall function 10005E30: CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E9F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$DeleteLibraryLoad$AttributesCacheCloseCopyCreateDownloadHandleReadSize
                  • String ID: .functions$ENDSERVERBUFFER$STARTSERVERBUFFER$URLMON.DLL$XTREME$http://$shell32.dll
                  • API String ID: 1556940775-4263465085
                  • Opcode ID: 4ee3fca3fa4ba668606f9b885bd85ae8f743085f3bd6b7371585acf1e6052cfe
                  • Instruction ID: 095f8cd7e1ad7f54d17a8aaba90678f4abf6843293fa25502bb1c2560b129c41
                  • Opcode Fuzzy Hash: 4ee3fca3fa4ba668606f9b885bd85ae8f743085f3bd6b7371585acf1e6052cfe
                  • Instruction Fuzzy Hash: 3FB14D78A001199BEB11DBA4CC82ADFB7B9FF44380F5081A5F504A765ADB74AF858F50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,1000B2FA,?,?,00000000,00000000), ref: 1000B1C1
                    • Part of subcall function 10005F1C: GetFileAttributesW.KERNEL32(00000000,00000000,10005F73,?,?,?,?,?,1000C491,00000000,00000000,?,00000002,?,?,.dat), ref: 10005F46
                    • Part of subcall function 10005F1C: SetFileAttributesW.KERNEL32(00000000,00000000,00000000,00000000,10005F73,?,?,?,?,?,1000C491,00000000,00000000,?,00000002,?), ref: 10005F58
                    • Part of subcall function 10003788: SysFreeString.OLEAUT32(?), ref: 1000379B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Attributes$CopyFreeString
                  • String ID: RECYCLER\$RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$[autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$action=Open folder to view files$autorun.inf$icon=shell32.dll,4$label=PENDRIVE$shell\Open=Open$shell\Open\Default=1$shell\Open\command=$shellexecute=
                  • API String ID: 1359780422-631342129
                  • Opcode ID: 13ecfe44ea8818081acd79cdab56d55be9f714c6c0a79ac0d907a72402bacc2f
                  • Instruction ID: e38e5125926d32c1d26ff353fbb275c64c03e2d6fa0b8cc01eec99beb1e39287
                  • Opcode Fuzzy Hash: 13ecfe44ea8818081acd79cdab56d55be9f714c6c0a79ac0d907a72402bacc2f
                  • Instruction Fuzzy Hash: CA616334909688AFEB03DF64CC519DEBF75DF46280B5580E6F040AB15BD774AE05CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10008D4C: SendMessageA.USER32 ref: 10008D6F
                    • Part of subcall function 10008D4C: CloseHandle.KERNEL32(00000000,1000C6A4,?,00000000,00000000,?,00000002,?,?,.dat,?,1000C958,?,.xtr,?,1000C958), ref: 10008D83
                  • ShowWindow.USER32(00000000,00000000,00000000,100095DE,?,00000000,00000000,00000000,?,1000C659,00000000,00000000,?,00000002,?,?), ref: 10009443
                  • SetFileAttributesW.KERNEL32(00000000,00000080,00000000,00000000,00000000,100095DE,?,00000000,00000000,00000000,?,1000C659,00000000,00000000,?,00000002), ref: 10009467
                  • CreateFileW.KERNEL32(00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000,00000000,00000000,100095DE,?,00000000,00000000), ref: 10009486
                  • GetFileSize.KERNEL32(00000000,00000000,00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000,00000000,00000000,100095DE), ref: 100094C3
                  • SetFileAttributesW.KERNEL32(00000000,00000007,00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000,00000000,00000000,100095DE), ref: 10009554
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00000000,00000007,00000000,C0000000,00000003,00000000,00000004,00000000,00000000,00000000,00000080,00000000), ref: 10009565
                  • SendMessageA.USER32 ref: 1000957F
                  • SetClipboardViewer.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000000,00000007,00000000,C0000000,00000003,00000000,00000004), ref: 1000958F
                    • Part of subcall function 10006510: GetDesktopWindow.USER32 ref: 10006571
                    • Part of subcall function 10006510: GetWindowRect.USER32 ref: 10006577
                    • Part of subcall function 10006510: GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?), ref: 1000657E
                    • Part of subcall function 10006510: RegisterClassW.USER32 ref: 1000658A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Window$AttributesHandleMessageSend$ClassClipboardCloseCreateDesktopModulePointerRectRegisterShowSizeViewer
                  • String ID: LastSize$SOFTWARE\$XtremeKeylogger$qualquercoisarsrsr
                  • API String ID: 411803610-193067991
                  • Opcode ID: 676dcd07bedc78bc966ac9f8878885fe89c124370f656291f037c9e9c79c44c2
                  • Instruction ID: e10228e688af51e092dac2c6f3dee7a218e45a64ed0b3a8379d93de067ea2b0a
                  • Opcode Fuzzy Hash: 676dcd07bedc78bc966ac9f8878885fe89c124370f656291f037c9e9c79c44c2
                  • Instruction Fuzzy Hash: 86415E78604251AFF711EB70CC92F6E37A9E7483C0F518029F144AB6FECEB6A8419751
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,1000B2FA,?,?,00000000,00000000), ref: 1000B1C1
                    • Part of subcall function 10005F1C: GetFileAttributesW.KERNEL32(00000000,00000000,10005F73,?,?,?,?,?,1000C491,00000000,00000000,?,00000002,?,?,.dat), ref: 10005F46
                    • Part of subcall function 10005F1C: SetFileAttributesW.KERNEL32(00000000,00000000,00000000,00000000,10005F73,?,?,?,?,?,1000C491,00000000,00000000,?,00000002,?), ref: 10005F58
                    • Part of subcall function 10003788: SysFreeString.OLEAUT32(?), ref: 1000379B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$Attributes$CopyFreeString
                  • String ID: RECYCLER\$RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$[autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$action=Open folder to view files$autorun.inf$icon=shell32.dll,4$label=PENDRIVE$shell\Open=Open$shell\Open\Default=1$shell\Open\command=$shellexecute=
                  • API String ID: 1359780422-631342129
                  • Opcode ID: f3564a97d53de12c9b48bdf10bff330839f6c1832b8590ef24407a4c5debb447
                  • Instruction ID: 6ae93d5114324f60805c066673cfebbd25bb18d06d828e6891266f46ee2437b0
                  • Opcode Fuzzy Hash: f3564a97d53de12c9b48bdf10bff330839f6c1832b8590ef24407a4c5debb447
                  • Instruction Fuzzy Hash: 71410E38900909ABEB05EF94CD82DDEB7B9EF44281F90C165F500B725EDB71BE058BA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegisterClipboardFormatW.USER32(jiejwogfdjieovevodnvfnievn), ref: 10009717
                  • RegisterClipboardFormatW.USER32(gsegtsrgrefsfsfsgrsgrt), ref: 10009726
                  • RegisterClipboardFormatW.USER32(trhgtehgfsgrfgtrwegtre), ref: 10009735
                  • RegisterClipboardFormatW.USER32(jytjyegrsfvfbgfsdf), ref: 10009744
                  • RegisterClipboardFormatW.USER32(hgtrfsgfrsgfgregtregtr), ref: 10009753
                  • RegisterClipboardFormatW.USER32(frgjbfdkbnfsdjbvofsjfrfre), ref: 10009762
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: ClipboardFormatRegister
                  • String ID: frgjbfdkbnfsdjbvofsjfrfre$gsegtsrgrefsfsfsgrsgrt$hgtrfsgfrsgfgregtregtr$jiejwogfdjieovevodnvfnievn$jytjyegrsfvfbgfsdf$trhgtehgfsgrfgtrwegtre
                  • API String ID: 1228543026-2672052065
                  • Opcode ID: eaca480185e3529857f08a7b99fa4587865511e38ce0a633c86f9ec4ba4854cf
                  • Instruction ID: ed3f77de684bd0d246fe2b552f76a464aac7a3f76a0323551fd1ca8e49655e55
                  • Opcode Fuzzy Hash: eaca480185e3529857f08a7b99fa4587865511e38ce0a633c86f9ec4ba4854cf
                  • Instruction Fuzzy Hash: 8BF0F9794192116EF701DF714C6697B7698E7453C13818529F5C882A3DDF3358059BE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegisterClipboardFormatW.USER32(jiejwogfdjieovevodnvfnievn), ref: 10009717
                  • RegisterClipboardFormatW.USER32(gsegtsrgrefsfsfsgrsgrt), ref: 10009726
                  • RegisterClipboardFormatW.USER32(trhgtehgfsgrfgtrwegtre), ref: 10009735
                  • RegisterClipboardFormatW.USER32(jytjyegrsfvfbgfsdf), ref: 10009744
                  • RegisterClipboardFormatW.USER32(hgtrfsgfrsgfgregtregtr), ref: 10009753
                  • RegisterClipboardFormatW.USER32(frgjbfdkbnfsdjbvofsjfrfre), ref: 10009762
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: ClipboardFormatRegister
                  • String ID: frgjbfdkbnfsdjbvofsjfrfre$gsegtsrgrefsfsfsgrsgrt$hgtrfsgfrsgfgregtregtr$jiejwogfdjieovevodnvfnievn$jytjyegrsfvfbgfsdf$trhgtehgfsgrfgtrwegtre
                  • API String ID: 1228543026-2672052065
                  • Opcode ID: 0db88cb41446c7a1772992425046f1e51f35a21a88b435333acbf191ec07eeb4
                  • Instruction ID: 4cd3ad10a4a29e5a40757261822789eba1ab52c8d76854998792a07700413263
                  • Opcode Fuzzy Hash: 0db88cb41446c7a1772992425046f1e51f35a21a88b435333acbf191ec07eeb4
                  • Instruction Fuzzy Hash: EDF0F4B94192116EF701DFB18C6A97B7A98E7453C13818529E6C882A3DDF331405ABE2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • CharNextW.USER32(00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 10005877
                  • CharNextW.USER32(00000000,00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 10005881
                  • CharNextW.USER32(00000000,00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 100058AA
                  • CharNextW.USER32(00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 100058B4
                  • CharNextW.USER32(00000000,00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 100058E9
                  • CharNextW.USER32(00000000,00000000,00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 100058F3
                  • CharNextW.USER32(00000000,00000000,00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 10005920
                  • CharNextW.USER32(00000000,00000000,?,00000000,00000001,?,1000599D,1000F834,?,?,1000D14C,00008007,00000000,1000D759), ref: 1000592A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CharNext
                  • String ID: "$"
                  • API String ID: 3213498283-3758156766
                  • Opcode ID: 56db7724e89b489fdf42acb8acbc4d14fc1821fe57b6b69609cfd9fea17b0585
                  • Instruction ID: 49fe6b66c80159b6a372ae54facb011d0530469a5cfb0b84791d945b4afab074
                  • Opcode Fuzzy Hash: 56db7724e89b489fdf42acb8acbc4d14fc1821fe57b6b69609cfd9fea17b0585
                  • Instruction Fuzzy Hash: EA31E74D70031795FB20FA649CC025B72D5EB452D3BA6C931ED41A728EEDB25C438369
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • LoadLibraryA.KERNEL32(URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A5A8
                  • LoadLibraryA.KERNEL32(shell32.dll,URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A5B2
                  • SetFileAttributesW.KERNEL32(00000000,00000080,shell32.dll,URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A5E7
                  • DeleteFileW.KERNEL32(00000000,00000002,00000000,00000000,00000080,shell32.dll,URLMON.DLL,00000000,1000A98B,?,?,?,?,00000000,00000000), ref: 1000A6BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileLibraryLoad$AttributesDelete
                  • String ID: ENDSERVERBUFFER$STARTSERVERBUFFER$URLMON.DLL$XTREME$shell32.dll
                  • API String ID: 1064610246-2417524110
                  • Opcode ID: 5f286e1d0fd3c37f5beda26e71c0865df4d0ed5b9a9d771c72d972da7527a27b
                  • Instruction ID: 30b3ef76a2a80ae0936852672a2bbee531ad642fb2a80bd77bca9c30e5cd02f7
                  • Opcode Fuzzy Hash: 5f286e1d0fd3c37f5beda26e71c0865df4d0ed5b9a9d771c72d972da7527a27b
                  • Instruction Fuzzy Hash: 7F418D78A141199BEB11DBA4CC82BEFB3B9FF44380F508165F504A728ADB34BE418B64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • Sleep.KERNEL32(000003E8,00000000,1000937D,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 10009230
                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,000003E8,00000000,1000937D,?,?,?,?,00000000), ref: 100092FD
                  • SetEndOfFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,000003E8,00000000,1000937D), ref: 10009305
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$PointerSleep
                  • String ID: .html$FTP$LastSize$SOFTWARE\$jjj
                  • API String ID: 1384090385-2221063783
                  • Opcode ID: f64d9703497d1778a1f724dcd6172282dd11fce0a9d43a36a9a9269ada9e7162
                  • Instruction ID: 1ef3a85e4ac3c80801a06b688fa0acd6d065186ae52865efd5065228073e7574
                  • Opcode Fuzzy Hash: f64d9703497d1778a1f724dcd6172282dd11fce0a9d43a36a9a9269ada9e7162
                  • Instruction Fuzzy Hash: 9F317078500145BFF705DB64CD81BAF77ADEB453C0F904129F440AB6BACBB2AD509B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocString
                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                  • API String ID: 2525500382-909552448
                  • Opcode ID: 19a7d89fdd0d4a8943666261cc10e3fb7835feb1d7da3395f8e32f4d42fefbdb
                  • Instruction ID: 07abd4759daa604870a4f77bd8534178fed91fd4fee8f89ff290bb29f67fd9b2
                  • Opcode Fuzzy Hash: 19a7d89fdd0d4a8943666261cc10e3fb7835feb1d7da3395f8e32f4d42fefbdb
                  • Instruction Fuzzy Hash: E5211D38B041C99BF711DA99858295FB3E9DB8D7C2FB08091B8415731EDB37BF019622
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10003770: SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$FreeString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 610577094-3409537306
                  • Opcode ID: ed6114367509c6d9fab90cc7175f2c84ae42d38466c56a82ea0a6d039912394e
                  • Instruction ID: 239179f37c3e83d944ae5989e00453cfc3f7d2dfafefd2690d13731161f6058c
                  • Opcode Fuzzy Hash: ed6114367509c6d9fab90cc7175f2c84ae42d38466c56a82ea0a6d039912394e
                  • Instruction Fuzzy Hash: 9451E9B9E002545BF721CB24CC41B9F73A9FB887C0F5081A5FA489724ADA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,1000319A,?,?,?,00000002,1000323A,1000259B,100025E3,00000002,00000000), ref: 10003105
                  • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,1000319A,?,?,?,00000002,1000323A,1000259B,100025E3,00000002), ref: 1000310B
                  • GetStdHandle.KERNEL32(000000F5,10003154,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,1000319A,?,?), ref: 10003120
                  • WriteFile.KERNEL32(00000000,000000F5,10003154,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,1000319A,?,?), ref: 10003126
                  • MessageBoxA.USER32 ref: 10003144
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FileHandleWrite$Message
                  • String ID: Error$Runtime error at 00000000
                  • API String ID: 1570097196-2970929446
                  • Opcode ID: 34c1e474a0937ca068d19135c8955f1baf6dec87746d38fd93c81dd1fbdfdeba
                  • Instruction ID: d75082f90510a20ccce61780b3b63c21f75a1319e25b57c37db6013eec112d5f
                  • Opcode Fuzzy Hash: 34c1e474a0937ca068d19135c8955f1baf6dec87746d38fd93c81dd1fbdfdeba
                  • Instruction Fuzzy Hash: F8F0B4BA9443D078F621E3608C86FEB239CC745BD0F108208F364648DFCBE468C4A626
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • VirtualFree.KERNEL32(?,00000000,00008000,00000000,10008BA5,?,?,?,0000002E,00000000,00000000), ref: 100085B7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeVirtual
                  • String ID: $ --- $</font>$<FONT COLOR="blue">[
                  • API String ID: 1263568516-341333612
                  • Opcode ID: 844369069b05dfd62b440b7fafa7b9f06d8a9886853feb290a734d0b2ba6acd8
                  • Instruction ID: 82ed3cb906cd8235e36a84cac39b9343783464e2b4201940a396f7c820685ddb
                  • Opcode Fuzzy Hash: 844369069b05dfd62b440b7fafa7b9f06d8a9886853feb290a734d0b2ba6acd8
                  • Instruction Fuzzy Hash: 6F513A78A00119AFEB11DB94CC81FDEB7B9FB48380F5084A1F548A7269DB31BF458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10003770: SysFreeString.OLEAUT32(1000CFDC), ref: 1000377E
                  • FindResourceW.KERNEL32(10000000,XTREMEBINDER,0000000A,?,?,1000F834,?,1000B7CA,00000000,1000BC5D,?,1000F834,00000000,00000000,000002C4,00000000), ref: 1000B71A
                  • SizeofResource.KERNEL32(10000000,00000000,10000000,XTREMEBINDER,0000000A,?,?,1000F834,?,1000B7CA,00000000,1000BC5D,?,1000F834,00000000,00000000), ref: 1000B728
                  • LoadResource.KERNEL32(10000000,00000000,10000000,00000000,10000000,XTREMEBINDER,0000000A,?,?,1000F834,?,1000B7CA,00000000,1000BC5D,?,1000F834), ref: 1000B736
                  • LockResource.KERNEL32(00000000,10000000,00000000,10000000,00000000,10000000,XTREMEBINDER,0000000A,?,?,1000F834,?,1000B7CA,00000000,1000BC5D), ref: 1000B73E
                  • FreeResource.KERNEL32(00000000,00000000,10000000,00000000,10000000,00000000,10000000,XTREMEBINDER,0000000A,?,?,1000F834,?,1000B7CA,00000000,1000BC5D), ref: 1000B765
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Resource$Free$FindLoadLockSizeofString
                  • String ID: XTREMEBINDER
                  • API String ID: 1314290513-399165745
                  • Opcode ID: 17ceae75176a0c04b03f872206b008580ef93f74fcc784d7bab5c6ea897d36e1
                  • Instruction ID: 56a9b21ec2ef0885f1dba9b5c05c5a0442ce31da9cf93dba5427497db9e4b129
                  • Opcode Fuzzy Hash: 17ceae75176a0c04b03f872206b008580ef93f74fcc784d7bab5c6ea897d36e1
                  • Instruction Fuzzy Hash: A2F09AAA700A542BB111E7BD8CC1D3F738DEB84AC0B420020F608DB21ECE29FC0543A8
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RtlEnterCriticalSection.KERNEL32(1000F5B8,00000000,100019DA), ref: 10001931
                  • LocalFree.KERNEL32(00000000,00000000,100019DA), ref: 10001943
                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,100019DA), ref: 10001962
                  • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,100019DA), ref: 100019A1
                  • RtlLeaveCriticalSection.KERNEL32(1000F5B8,100019E1,00000000,00000000,100019DA), ref: 100019CA
                  • RtlDeleteCriticalSection.KERNEL32(1000F5B8,100019E1,00000000,00000000,100019DA), ref: 100019D4
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                  • String ID:
                  • API String ID: 3782394904-0
                  • Opcode ID: 4d314bb510370c6eda77b791f80044d8227fb3aea424606413f6edf4cfd7fdca
                  • Instruction ID: c7235647f75663e059265485ffa3ed86b09466631e02243638bb2540abc76f59
                  • Opcode Fuzzy Hash: 4d314bb510370c6eda77b791f80044d8227fb3aea424606413f6edf4cfd7fdca
                  • Instruction Fuzzy Hash: 591182B9604A906EF715DF648CA1BF53799E7452C6F80405CF340879AEDB25A840E761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Numpad /]
                  • API String ID: 783433895-3841828083
                  • Opcode ID: a69122926cd9ff44543af4826b796c0f070a02847923b1c1add8bc23721ad3f3
                  • Instruction ID: fa9f52e14e4bae6c9c3f3ac931d5b0ad477dd65ff029e14091f69c139beb8dbd
                  • Opcode Fuzzy Hash: a69122926cd9ff44543af4826b796c0f070a02847923b1c1add8bc23721ad3f3
                  • Instruction Fuzzy Hash: 3931BEB8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489B24ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Numpad *]
                  • API String ID: 783433895-2575978678
                  • Opcode ID: 40a71dd3fd3848f36daa4371efc6091b58f5d128a51f6a9aba358ae957a7c821
                  • Instruction ID: d9c473077837587251831d3c435770d097e1af4f38d4c7dbbca54610dc210ef0
                  • Opcode Fuzzy Hash: 40a71dd3fd3848f36daa4371efc6091b58f5d128a51f6a9aba358ae957a7c821
                  • Instruction Fuzzy Hash: B831C0B8F042545BF722D7658C45B9F73A9FB882C0F50C1A5F5489B20ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Backspace]
                  • API String ID: 783433895-3993161958
                  • Opcode ID: ce0ad2ca1f90caf9ea666e0b07d6a3e8c10c8d2f93d8c23ca1895d0225b460b2
                  • Instruction ID: 70b2502395a00a419c57d53d4495c89bce5646a586783f0d1f72156cf019b369
                  • Opcode Fuzzy Hash: ce0ad2ca1f90caf9ea666e0b07d6a3e8c10c8d2f93d8c23ca1895d0225b460b2
                  • Instruction Fuzzy Hash: 9031C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Numpad .]
                  • API String ID: 783433895-4259747250
                  • Opcode ID: b54b2f61d87570f8875ef0f8debff805adedceafda15ff330bb240909df8f3a1
                  • Instruction ID: 0bc05a9cc8b03a63822bed3d9a4d5e012b227a2082e24ae561fe8c67785f8955
                  • Opcode Fuzzy Hash: b54b2f61d87570f8875ef0f8debff805adedceafda15ff330bb240909df8f3a1
                  • Instruction Fuzzy Hash: 2A31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Esc]
                  • API String ID: 783433895-3858598201
                  • Opcode ID: 77c0f584e0695a7ac5b051d0ce750dd1d5baeb7579199a9787a9a3ee3ba27aa5
                  • Instruction ID: a0438d12f8ed14f13429e205a5184d8ddefa3685f311b8074393ca4d61dc1d3f
                  • Opcode Fuzzy Hash: 77c0f584e0695a7ac5b051d0ce750dd1d5baeb7579199a9787a9a3ee3ba27aa5
                  • Instruction Fuzzy Hash: 6131C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489724ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Back Tab]
                  • API String ID: 783433895-1646378708
                  • Opcode ID: 93a1f9fd4b03a2b64f3aec136e1b11870f180bc3e6a4538c105c08aaf9b2b6df
                  • Instruction ID: 3a85998fe2589ccb64e60228e5e214ad5b480cee4fe54291cbf2aada2de1e6bb
                  • Opcode Fuzzy Hash: 93a1f9fd4b03a2b64f3aec136e1b11870f180bc3e6a4538c105c08aaf9b2b6df
                  • Instruction Fuzzy Hash: 4131C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Copy]
                  • API String ID: 783433895-3795801677
                  • Opcode ID: 44d757909d80be684137888da5a970062e875dbb24bf93a2939e8a7e6361997e
                  • Instruction ID: 34291bd968ee6a57f754c6061d72616049048bf9c09e257ad4a1739f3e02d25f
                  • Opcode Fuzzy Hash: 44d757909d80be684137888da5a970062e875dbb24bf93a2939e8a7e6361997e
                  • Instruction Fuzzy Hash: 0D31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Finish]
                  • API String ID: 783433895-126034051
                  • Opcode ID: 692f9ff7583ff38c64fa304b1c97454ce66ce919cf4bbd85751b8f3092655a58
                  • Instruction ID: a0ed5623e56a33cb834bfc176e6fd190eaeae0050e97d100fa21e54e37a1b336
                  • Opcode Fuzzy Hash: 692f9ff7583ff38c64fa304b1c97454ce66ce919cf4bbd85751b8f3092655a58
                  • Instruction Fuzzy Hash: EB31BEB8B042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Reset]
                  • API String ID: 783433895-245523249
                  • Opcode ID: 0bc9773a6bbad631a6a70fe1f822373a926ab4f180a8ef66085c0ab71cdd19d9
                  • Instruction ID: 291c1767fd01b166514c41e15e57a47f42bc66d9c0c46ca14ea2eebe3236c6d1
                  • Opcode Fuzzy Hash: 0bc9773a6bbad631a6a70fe1f822373a926ab4f180a8ef66085c0ab71cdd19d9
                  • Instruction Fuzzy Hash: F031C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Play]
                  • API String ID: 783433895-3392069046
                  • Opcode ID: 7cbc7b547a09e3bc52c6deb3fa975999c833a7782dcd4b422faccb44a12d16fc
                  • Instruction ID: c39f81576484fb7735cad50cf9efa43f524eeb1dbde31a28f4c5d3b5c036a80a
                  • Opcode Fuzzy Hash: 7cbc7b547a09e3bc52c6deb3fa975999c833a7782dcd4b422faccb44a12d16fc
                  • Instruction Fuzzy Hash: 2731C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Process]
                  • API String ID: 783433895-2206852380
                  • Opcode ID: 9cc73bee2c5c66c45c57059d7ed4abb569be2cba4b687590c36e796b9dc273c7
                  • Instruction ID: 542da9702f65af167a2acd74eee3d938ae924f742fa8779219d2eac7aa9adbbf
                  • Opcode Fuzzy Hash: 9cc73bee2c5c66c45c57059d7ed4abb569be2cba4b687590c36e796b9dc273c7
                  • Instruction Fuzzy Hash: 3431C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Select]
                  • API String ID: 783433895-2413838692
                  • Opcode ID: 514ff3e34b14a9e5d8ab413587dce2c2f410968874725fa2580441ff6d415804
                  • Instruction ID: a17747a1b3028d12c7a4f27126b47fc81b0c71295ef6cb46dcdf9e05795c8619
                  • Opcode Fuzzy Hash: 514ff3e34b14a9e5d8ab413587dce2c2f410968874725fa2580441ff6d415804
                  • Instruction Fuzzy Hash: 1E31C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Separator]
                  • API String ID: 783433895-3494163826
                  • Opcode ID: b28f82d1315a21c0ec3eeca5f420e7cb8781b37bf75afc05d08b2ace6efbe94e
                  • Instruction ID: 4579c8cabb46fc9fc98fa56ae242cb9821b75e5cae476442ada672dc186bafb3
                  • Opcode Fuzzy Hash: b28f82d1315a21c0ec3eeca5f420e7cb8781b37bf75afc05d08b2ace6efbe94e
                  • Instruction Fuzzy Hash: A831C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Numpad -]
                  • API String ID: 783433895-3603678833
                  • Opcode ID: f727318df62ab6984be34b48274f61689c13b89c74ec8ef95ab27e6241858d3f
                  • Instruction ID: b676ca2d17fe351d24fe2de8df4d6e9bb7385714fcd3c7b893a6d02882ec396e
                  • Opcode Fuzzy Hash: f727318df62ab6984be34b48274f61689c13b89c74ec8ef95ab27e6241858d3f
                  • Instruction Fuzzy Hash: D031C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Tab]
                  • API String ID: 783433895-199360412
                  • Opcode ID: a785524ab226e4e94283a726cfb6f81e18d137b6129507000f7a99f762322629
                  • Instruction ID: 2d267a324e9484a07124ea1970936e27bf22569b5696d9d4b95596e51c586869
                  • Opcode Fuzzy Hash: a785524ab226e4e94283a726cfb6f81e18d137b6129507000f7a99f762322629
                  • Instruction Fuzzy Hash: 5C31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Zoom]
                  • API String ID: 783433895-3055259814
                  • Opcode ID: c86214f759ae3126244a3cd9606ceefeacbd963b4d36a47ee78664366667e26b
                  • Instruction ID: c5f0f41a8bcff8c1d7aba9d7791743940dec5144013e653b87fb915418b11de3
                  • Opcode Fuzzy Hash: c86214f759ae3126244a3cd9606ceefeacbd963b4d36a47ee78664366667e26b
                  • Instruction Fuzzy Hash: 4331C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Accept]
                  • API String ID: 783433895-902341990
                  • Opcode ID: 061c268dcb76f09fc094880b4e13fa08ad57f8be8229b2d86ba77c075008c1be
                  • Instruction ID: d2ccba2c791f0b7862c28547fcae4e8d4588ca6c664595fde746ffb7111930bd
                  • Opcode Fuzzy Hash: 061c268dcb76f09fc094880b4e13fa08ad57f8be8229b2d86ba77c075008c1be
                  • Instruction Fuzzy Hash: 7831C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECAB8EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Context Menu]
                  • API String ID: 783433895-1701729690
                  • Opcode ID: 5d34866b129b1461d8c55ee51f28b427d56f46fb75139132869c509ee41a27b4
                  • Instruction ID: 9c56b4dc1bb70802c6b761373c7da6d8c422a16c06a74f10d60259aa3dc6bda0
                  • Opcode Fuzzy Hash: 5d34866b129b1461d8c55ee51f28b427d56f46fb75139132869c509ee41a27b4
                  • Instruction Fuzzy Hash: E531C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Caps Lock]
                  • API String ID: 783433895-928131802
                  • Opcode ID: 490ffde09bfcbb988d4b6b8e85d853c254a7b6d763ca68262fef91c207acda70
                  • Instruction ID: 1db21de267972ec542353e6ccb0e08bd67032bee9118580e561326deec9e72ff
                  • Opcode Fuzzy Hash: 490ffde09bfcbb988d4b6b8e85d853c254a7b6d763ca68262fef91c207acda70
                  • Instruction Fuzzy Hash: 2231C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Delete]
                  • API String ID: 783433895-1730770369
                  • Opcode ID: 400296010eaf9738d0fbc21618fd4f91ee1e467b3b431434bb3075d31a3e91e2
                  • Instruction ID: bb44ce128919629e04e34867fdffb35d74004a6f3688c35cfe140960795f1254
                  • Opcode Fuzzy Hash: 400296010eaf9738d0fbc21618fd4f91ee1e467b3b431434bb3075d31a3e91e2
                  • Instruction Fuzzy Hash: 5C31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Arrow Down]
                  • API String ID: 783433895-3022692989
                  • Opcode ID: f45b26b29b61d5e51fb90bdc8d895315599a8a53428478e9d688cd7bca0c64de
                  • Instruction ID: 02fcabc6e8f29592f11b422fe8cf2b1af30d8c93f08c5ed3910a1be214322d5a
                  • Opcode Fuzzy Hash: f45b26b29b61d5e51fb90bdc8d895315599a8a53428478e9d688cd7bca0c64de
                  • Instruction Fuzzy Hash: 9031BEB8B042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[End]
                  • API String ID: 783433895-3192008669
                  • Opcode ID: 8be033b71e6cc91fa7183bd242525b69fd42a60ab2c77db8e333b15f6c02985c
                  • Instruction ID: 877a2d7053b44eef148fc6c70e56ab44244d2a6eb94c84edd50b79bcd33e9510
                  • Opcode Fuzzy Hash: 8be033b71e6cc91fa7183bd242525b69fd42a60ab2c77db8e333b15f6c02985c
                  • Instruction Fuzzy Hash: C431C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F1]
                  • API String ID: 783433895-641059523
                  • Opcode ID: 64e4913f7c88e1f6cf871e329d884627882b20964cb17dd16a0edd8879f2af3b
                  • Instruction ID: 59f01fadd6c1986280f76c7ec94e26e07e8e794a631d308a07038ad1fc5cdc92
                  • Opcode Fuzzy Hash: 64e4913f7c88e1f6cf871e329d884627882b20964cb17dd16a0edd8879f2af3b
                  • Instruction Fuzzy Hash: 4231C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE49CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F10]
                  • API String ID: 783433895-364933614
                  • Opcode ID: 9f166c72ca3fb3b12034e07594ffb6c51ca785a8f37ad7b268c171178664f28e
                  • Instruction ID: 4cdd846a56abf61bb4e4c6fde4f6555a2bc56d43735489f94f76061a9b7946e9
                  • Opcode Fuzzy Hash: 9f166c72ca3fb3b12034e07594ffb6c51ca785a8f37ad7b268c171178664f28e
                  • Instruction Fuzzy Hash: 5931C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F11]
                  • API String ID: 783433895-215695535
                  • Opcode ID: ea95564da9a66dc7470533b2786a86451c8797b2579bdf17ac1d53f73ee1c4ab
                  • Instruction ID: ab767402ff5a0ef776935679cf191d8ea99af36a4d9809d38744d6a7013e6ded
                  • Opcode Fuzzy Hash: ea95564da9a66dc7470533b2786a86451c8797b2579bdf17ac1d53f73ee1c4ab
                  • Instruction Fuzzy Hash: 8C31C0B8F042545BF722DB658C85B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F12]
                  • API String ID: 783433895-670438252
                  • Opcode ID: 0c12ee716339a32b888c429408e51ea20923bef0f46d25eede9ce57d1a8b8c38
                  • Instruction ID: 79f6c1988ebe657b0a26f0600b493b9fd807da5f9602e5f532d1718735006c02
                  • Opcode Fuzzy Hash: 0c12ee716339a32b888c429408e51ea20923bef0f46d25eede9ce57d1a8b8c38
                  • Instruction Fuzzy Hash: 0D31C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECAB8EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F13]
                  • API String ID: 783433895-1055728173
                  • Opcode ID: 55794011ea89da0739b276c20e738cabb44d155302fcc1f045d1e4b9aea512c3
                  • Instruction ID: 7717c9acb7a48c1fd9aa5c525c440081627dfa369ae28c64501c57b8f83c06ce
                  • Opcode Fuzzy Hash: 55794011ea89da0739b276c20e738cabb44d155302fcc1f045d1e4b9aea512c3
                  • Instruction Fuzzy Hash: 0131C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F14]
                  • API String ID: 783433895-1907143914
                  • Opcode ID: 203ad46c11f461d6459dc7cfca51af08d8e7ecda52987724564deb56dbc02e20
                  • Instruction ID: 7a25b7b709d0a6fd19846fba783c816f7393c35fd42baf023038af521e89d6ec
                  • Opcode Fuzzy Hash: 203ad46c11f461d6459dc7cfca51af08d8e7ecda52987724564deb56dbc02e20
                  • Instruction Fuzzy Hash: 6831C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F15]
                  • API String ID: 783433895-1756857771
                  • Opcode ID: f8b9d19cacf00eabcfa74d6abe32546b7e715af37a9aab5616ce0c298a08cd1d
                  • Instruction ID: a3abf2809a5496e46b19b8e66a7b892f1753b03d83a72077e8ed13536b214ed3
                  • Opcode Fuzzy Hash: f8b9d19cacf00eabcfa74d6abe32546b7e715af37a9aab5616ce0c298a08cd1d
                  • Instruction Fuzzy Hash: 9531C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECAB8EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F16]
                  • API String ID: 783433895-1134220904
                  • Opcode ID: 8801c05138b566acd2804adc7f16252f9de8661d5aa877f6d0b8586ef6fde810
                  • Instruction ID: 9ded0a974e7829e14449a0db8178bd5f1510f0ab5ff1090cc1a9a41416e86c25
                  • Opcode Fuzzy Hash: 8801c05138b566acd2804adc7f16252f9de8661d5aa877f6d0b8586ef6fde810
                  • Instruction Fuzzy Hash: 2831C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F17]
                  • API String ID: 783433895-1518462761
                  • Opcode ID: 89e69890d16f782e70caca9f1ed976a7ef2713fc690923ff71a1332dafe3380d
                  • Instruction ID: 2ed4a8681e7407375f66ccd48db4609f3149d056e008a571d680b5df1c264ba8
                  • Opcode Fuzzy Hash: 89e69890d16f782e70caca9f1ed976a7ef2713fc690923ff71a1332dafe3380d
                  • Instruction Fuzzy Hash: 8231C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F18]
                  • API String ID: 783433895-3709467622
                  • Opcode ID: 6d6948c150d618c0e6ff589f068a60c306c83d8aae76315f58b2b8978f8f552d
                  • Instruction ID: 149d1606a04f5e631dce96eb90406079d1e697c39fef19b4217db4c894f8743d
                  • Opcode Fuzzy Hash: 6d6948c150d618c0e6ff589f068a60c306c83d8aae76315f58b2b8978f8f552d
                  • Instruction Fuzzy Hash: 2C31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C4A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F19]
                  • API String ID: 783433895-3288517287
                  • Opcode ID: fdf93db7dfc6a872f4b4257a607c2791a5697a33a6d87c52e9f2c4f7bf3239d7
                  • Instruction ID: c1d88a8a83b3fff2f0a92d393676b3d9be71f05b44633e1edb0896168ba610e4
                  • Opcode Fuzzy Hash: fdf93db7dfc6a872f4b4257a607c2791a5697a33a6d87c52e9f2c4f7bf3239d7
                  • Instruction Fuzzy Hash: 6F31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F2]
                  • API String ID: 783433895-219715840
                  • Opcode ID: bc4e0beed6f5971c97352df3017e66fb88d969414a5b5ea74617967ef4fb9ef4
                  • Instruction ID: b16667c500a8f6aee4ba6b3ba7482377eae1e2be3dd1480aee087fcb1cdc840b
                  • Opcode Fuzzy Hash: bc4e0beed6f5971c97352df3017e66fb88d969414a5b5ea74617967ef4fb9ef4
                  • Instruction Fuzzy Hash: D931C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F20]
                  • API String ID: 783433895-394710967
                  • Opcode ID: 6d471ac1e053abb11c3b1d7b11cba9aa75bbbea4d48d7b348b99f179170ee903
                  • Instruction ID: a680e9b239fa0aebbd035ce6a985e10c990f55e2f26307f0e1286ccc6e1c0c6e
                  • Opcode Fuzzy Hash: 6d471ac1e053abb11c3b1d7b11cba9aa75bbbea4d48d7b348b99f179170ee903
                  • Instruction Fuzzy Hash: D331C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F21]
                  • API String ID: 783433895-245235446
                  • Opcode ID: a583e5d24fb749a61087f2418aa3365330e5370283494b596e987e39d4a65dac
                  • Instruction ID: 510fef3e6fa0df149ae542c76aa25a181dcf5755431cbbb85e5b1cc66d8b058e
                  • Opcode Fuzzy Hash: a583e5d24fb749a61087f2418aa3365330e5370283494b596e987e39d4a65dac
                  • Instruction Fuzzy Hash: A131BEB8B042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F22]
                  • API String ID: 783433895-632335669
                  • Opcode ID: 538fe9a1677a7cf68954d1a7aa096ae76dd59aeb88e8845f61bacfcf84bd100c
                  • Instruction ID: 90321dbe446a42362a2d965519f54d3763325675bd58b520da20de7a1a4fc573
                  • Opcode Fuzzy Hash: 538fe9a1677a7cf68954d1a7aa096ae76dd59aeb88e8845f61bacfcf84bd100c
                  • Instruction Fuzzy Hash: 0931C0B8F042545BF722CB658C85B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F23]
                  • API String ID: 783433895-1017879668
                  • Opcode ID: ef35aa9342167d40ef5d6cda57461785793fe1f05099ee63a642656f0a901aee
                  • Instruction ID: 28673ba874af58d34bd6c2be020580e78fa885bb135c4682ba041cb78c112e65
                  • Opcode Fuzzy Hash: ef35aa9342167d40ef5d6cda57461785793fe1f05099ee63a642656f0a901aee
                  • Instruction Fuzzy Hash: 3631C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F24]
                  • API String ID: 783433895-1944718003
                  • Opcode ID: 665d1b7efd069a3ae324f5ec22a3b3878916ac6c883f3f9a389a2f470a77c692
                  • Instruction ID: c4be0e32e04de120a2cca3183412b642890461deb7d46080007a753c2659c191
                  • Opcode Fuzzy Hash: 665d1b7efd069a3ae324f5ec22a3b3878916ac6c883f3f9a389a2f470a77c692
                  • Instruction Fuzzy Hash: 7C31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE49CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F3]
                  • API String ID: 783433895-335784001
                  • Opcode ID: 80c9ce260dae226eb44177270cdbf564c4ea894a5715ee9831f10be66ef7018d
                  • Instruction ID: 5ffa793185ddc03e6bd9b518dcc1c3a840d5d258ef7404ebf5977b295413e047
                  • Opcode Fuzzy Hash: 80c9ce260dae226eb44177270cdbf564c4ea894a5715ee9831f10be66ef7018d
                  • Instruction Fuzzy Hash: 3031BEB8B042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F4]
                  • API String ID: 783433895-1531068038
                  • Opcode ID: 6d9a0e9fbebd9a50c8bcb9db2712b1e2ac49f4d56deef2cfada9a671fa5fc202
                  • Instruction ID: 257b764002efa9c4341bee291622735cee0b2dcf4ecee3ad542065e968f39148
                  • Opcode Fuzzy Hash: 6d9a0e9fbebd9a50c8bcb9db2712b1e2ac49f4d56deef2cfada9a671fa5fc202
                  • Instruction Fuzzy Hash: 5D31C0B8F042545BF722CB658C85B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F5]
                  • API String ID: 783433895-1113132999
                  • Opcode ID: f81663136670eefa6b559e0c3c47de8a84feb9d0a987ea63e8a80dbafee9e838
                  • Instruction ID: e633cb04462a412f5613c9ae028300c402083a262aa70dec723c73e3e1fc98dc
                  • Opcode Fuzzy Hash: f81663136670eefa6b559e0c3c47de8a84feb9d0a987ea63e8a80dbafee9e838
                  • Instruction Fuzzy Hash: 8131C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F6]
                  • API String ID: 783433895-1769233412
                  • Opcode ID: de0a920129dad26d8c4fe0b58c73f8f855b5dba485b07b544234d7fa5c6e68d1
                  • Instruction ID: 06c9bff7c49a7ca2c2341c9269cfae46da6e7e947720c8e577cceb00dd52d8a3
                  • Opcode Fuzzy Hash: de0a920129dad26d8c4fe0b58c73f8f855b5dba485b07b544234d7fa5c6e68d1
                  • Instruction Fuzzy Hash: 9F31C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F7]
                  • API String ID: 783433895-1886350661
                  • Opcode ID: 345da217220ec433c981a36fa361fc3ad81173d5edecf30b3bf0f3c1a6518443
                  • Instruction ID: 73602d54f96144a7c61c9f0aea61f9d03e1029ed712db4d82cb90836cee0ee4d
                  • Opcode Fuzzy Hash: 345da217220ec433c981a36fa361fc3ad81173d5edecf30b3bf0f3c1a6518443
                  • Instruction Fuzzy Hash: 7E31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F8]
                  • API String ID: 783433895-4160188810
                  • Opcode ID: 269bc51cce26e08b7987e5e807f60e6eca6bbb1954024bbcceed0e0ae58e0d67
                  • Instruction ID: f8e9f27ca4e45bd5c8ec38f2eac8d4937add76fc56490cf5c4d7db7a8d0d77db
                  • Opcode Fuzzy Hash: 269bc51cce26e08b7987e5e807f60e6eca6bbb1954024bbcceed0e0ae58e0d67
                  • Instruction Fuzzy Hash: 6031C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECAB8EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[F9]
                  • API String ID: 783433895-4008460491
                  • Opcode ID: 444f65efb271440691118d92cbb22e99e4c9ae094b7b34bc2ed2fe1424e09415
                  • Instruction ID: 38b91922dc69364cef5aea0e1c7caf2c8941d83122a4e84074c5e0a9e1d120e7
                  • Opcode Fuzzy Hash: 444f65efb271440691118d92cbb22e99e4c9ae094b7b34bc2ed2fe1424e09415
                  • Instruction Fuzzy Hash: 7931C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Help]
                  • API String ID: 783433895-1051485797
                  • Opcode ID: ced4cd071d1595dfe819caa796369f839c5973703fb59967c5cdb73c5bd85563
                  • Instruction ID: f0b57f7016c57c8c20a1b9935e52d223e1421e2fc95fd17f59aa325daa1d6166
                  • Opcode Fuzzy Hash: ced4cd071d1595dfe819caa796369f839c5973703fb59967c5cdb73c5bd85563
                  • Instruction Fuzzy Hash: 6531C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Home]
                  • API String ID: 783433895-1734740514
                  • Opcode ID: 9ec5ab9d4604e29abd3d62d3fd543d6ce600cb0c2aac55af5353df70f8432c9f
                  • Instruction ID: 9b7988cd9c8808cb16b3aff513ce4990ca071120e42acbfc5b27312343c6384a
                  • Opcode Fuzzy Hash: 9ec5ab9d4604e29abd3d62d3fd543d6ce600cb0c2aac55af5353df70f8432c9f
                  • Instruction Fuzzy Hash: 5431B0B8B042545BF722C7658C45B9F73A9FB882C0F50C0A5B5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Insert]
                  • API String ID: 783433895-3655187251
                  • Opcode ID: 9d60750e0895b90f1793ccffef72419a008b73ac973bbf6264f6d5eda5d9540b
                  • Instruction ID: 57a58e9cbdcce06a745c8a6e1d46379205d73043c2f41df68cb32627f3cbbbdd
                  • Opcode Fuzzy Hash: 9d60750e0895b90f1793ccffef72419a008b73ac973bbf6264f6d5eda5d9540b
                  • Instruction Fuzzy Hash: 4831BEB8F042545BF722CB658C45B9F73A9FB882C0F50C0A6B5489720ECA78EE458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Mail]
                  • API String ID: 783433895-2576540148
                  • Opcode ID: 894362c06f24928aebacecf1c1ea633ebd1172f8d8f33313dcf1344a25e01b1e
                  • Instruction ID: fbc98f99418ed78a52aeb1d89c1fb141902b9a4107213f6ffe6694a7e55c15de
                  • Opcode Fuzzy Hash: 894362c06f24928aebacecf1c1ea633ebd1172f8d8f33313dcf1344a25e01b1e
                  • Instruction Fuzzy Hash: BC31C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Media]
                  • API String ID: 783433895-256090921
                  • Opcode ID: 1e0823390995c0d7b20590a1ed7fc42133228cec3a3e15fac83785cecb6d023e
                  • Instruction ID: 1d6d8283b16d110cfc78ae97d037f546bcd25651ecbbde41830c0a0e15c384cb
                  • Opcode Fuzzy Hash: 1e0823390995c0d7b20590a1ed7fc42133228cec3a3e15fac83785cecb6d023e
                  • Instruction Fuzzy Hash: AE31C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Left Ctrl]
                  • API String ID: 783433895-3005955766
                  • Opcode ID: 6e196f45300483c3a4ae03fa75a33ab96228d6b58ef24f6c2d519915bf58e4fe
                  • Instruction ID: 28846d815b0a88ec7f80af092469e54f7a14a72bd487e43e72f76064ef582a80
                  • Opcode Fuzzy Hash: 6e196f45300483c3a4ae03fa75a33ab96228d6b58ef24f6c2d519915bf58e4fe
                  • Instruction Fuzzy Hash: E731BEB8F042545BF722CB658C45B9F73A9FB882C0F50C0A6B5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Arrow Left]
                  • API String ID: 783433895-1177434692
                  • Opcode ID: 5da1957fa9e9ca11a06898b52d5d6c0a4425c8685ea52a547f580b048b1913c6
                  • Instruction ID: 960f23aa8f43220be064e63a19ba5b46ed73888c7d640a2a7c440eaac0204f03
                  • Opcode Fuzzy Hash: 5da1957fa9e9ca11a06898b52d5d6c0a4425c8685ea52a547f580b048b1913c6
                  • Instruction Fuzzy Hash: 5A31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A6F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Left Alt]
                  • API String ID: 783433895-4254496124
                  • Opcode ID: 2cec1b9318e2d2c86633c5b15370c804d0d016b88f7532adb9ff4300fb6f5750
                  • Instruction ID: 3f3db3c1f6d446afdc82a05f0a05d26ced4366bb5cd4d0252c92c5b85f9850ca
                  • Opcode Fuzzy Hash: 2cec1b9318e2d2c86633c5b15370c804d0d016b88f7532adb9ff4300fb6f5750
                  • Instruction Fuzzy Hash: DA31B0B8B042545BF722C7658C45B9F73A9FB882C0F50C0A5B5489720ECA78EE458761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Next Track]
                  • API String ID: 783433895-2289579739
                  • Opcode ID: 4bb0c2166a23f48689fc7f19d14cbfaf811bbbb3efc322fb13dea8c573a2909b
                  • Instruction ID: d5362d4f7291d6c897a022562f4ff387a401af9e6337d31ccc62730f376386c9
                  • Opcode Fuzzy Hash: 4bb0c2166a23f48689fc7f19d14cbfaf811bbbb3efc322fb13dea8c573a2909b
                  • Instruction Fuzzy Hash: 8731C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A6F5489724ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Play / Pause]
                  • API String ID: 783433895-1618082066
                  • Opcode ID: 574edec8092f91f95576e93fb39d4c139960eca42ee1905eafac8136fd6412dc
                  • Instruction ID: 996c3445bb2b0b98ef0d408312881446d9d9f055120b4c6d947ec6de027f53a4
                  • Opcode Fuzzy Hash: 574edec8092f91f95576e93fb39d4c139960eca42ee1905eafac8136fd6412dc
                  • Instruction Fuzzy Hash: 6631C2B8F042545BF722D7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Previous Track]
                  • API String ID: 783433895-3210990766
                  • Opcode ID: ae1fa225a0918d02fcfd180ec664d208efe1b38483678a19622561ea0e0a9972
                  • Instruction ID: 497027ec4e24f1f338977bd459717c223580bce7c7b0098a339831e971cc0eb2
                  • Opcode Fuzzy Hash: ae1fa225a0918d02fcfd180ec664d208efe1b38483678a19622561ea0e0a9972
                  • Instruction Fuzzy Hash: E131C2B8F042545BF722C7658C45B9F73A9FB892C0F50C0A5F5489724ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Stop]
                  • API String ID: 783433895-3279900245
                  • Opcode ID: 57c83d590c1141da6764717a6adadb01255764739223c7300deac7d1602d8fdb
                  • Instruction ID: 5922670b37668e1b016a45364b7f0f1fd26dfdd2ab1d479554ab01751d872b69
                  • Opcode Fuzzy Hash: 57c83d590c1141da6764717a6adadb01255764739223c7300deac7d1602d8fdb
                  • Instruction Fuzzy Hash: 3531BEB8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Mode Change]
                  • API String ID: 783433895-697438833
                  • Opcode ID: 951490631784bd0ba326a047b941ed8099158b17901292eede5ad9bfe8389a96
                  • Instruction ID: fde19adec7dbaa11acaab95407c7a091db194ab80798eb66de65d17821cfaf80
                  • Opcode Fuzzy Hash: 951490631784bd0ba326a047b941ed8099158b17901292eede5ad9bfe8389a96
                  • Instruction Fuzzy Hash: E631C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Page Down]
                  • API String ID: 783433895-3750966751
                  • Opcode ID: 90d8874289e11761f89f11684cbec7ed874ee66b227f605c1b29b6e1100aa61f
                  • Instruction ID: 2fd29d5386bce6dd60f48b13cf1f1d6e541de4379b2d15e3869f5661c23656ba
                  • Opcode Fuzzy Hash: 90d8874289e11761f89f11684cbec7ed874ee66b227f605c1b29b6e1100aa61f
                  • Instruction Fuzzy Hash: CC31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Num Lock]
                  • API String ID: 783433895-3773462824
                  • Opcode ID: 1422f95064fd9bc28c63e91cd01088c80977b6f7f954c3e9b92471192964d997
                  • Instruction ID: b38ecb3cb3baf4de96862ef28da595c431d1415fe82338e8afeba86307a38cc0
                  • Opcode Fuzzy Hash: 1422f95064fd9bc28c63e91cd01088c80977b6f7f954c3e9b92471192964d997
                  • Instruction Fuzzy Hash: 1431C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Pause]
                  • API String ID: 783433895-3639855092
                  • Opcode ID: 3ddccb20161475669b32e0ed3f5f6986b7ff8bc474ac456663870ed987cadc77
                  • Instruction ID: f377d357f69d7f331ddfabdbfb855c93a3b8fb647f7e8fffab3015d3f91a404c
                  • Opcode Fuzzy Hash: 3ddccb20161475669b32e0ed3f5f6986b7ff8bc474ac456663870ed987cadc77
                  • Instruction Fuzzy Hash: 6231C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Print]
                  • API String ID: 783433895-2723926450
                  • Opcode ID: 71e1bbc33dcade09357cc993f120fda1afbf8fb62500d9a110b3f8fbfb4a5a8d
                  • Instruction ID: 24b1e428621fc0ddc22d7c61b343553baf738b43ed31914f1cc8e82f23897795
                  • Opcode Fuzzy Hash: 71e1bbc33dcade09357cc993f120fda1afbf8fb62500d9a110b3f8fbfb4a5a8d
                  • Instruction Fuzzy Hash: 8731C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Page Up]
                  • API String ID: 783433895-227267868
                  • Opcode ID: ed868094e9fb9788b0736906f1eab0e99cfbf2a70a189b7d5b275534b12506be
                  • Instruction ID: d1f179d62c1294aab4835214f7be03122cb2be3f790280f2a5ffd5127ba462cb
                  • Opcode Fuzzy Hash: ed868094e9fb9788b0736906f1eab0e99cfbf2a70a189b7d5b275534b12506be
                  • Instruction Fuzzy Hash: 0331C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Right Ctrl]
                  • API String ID: 783433895-2161099509
                  • Opcode ID: 37b88f1e4698b1e3016850942fdcabb82c0df24804045081dcb261375e4b9424
                  • Instruction ID: 8e6155c5c846e0b52aba043055f7dd5c5d9cb4f960ca40d31a8d32a727805560
                  • Opcode Fuzzy Hash: 37b88f1e4698b1e3016850942fdcabb82c0df24804045081dcb261375e4b9424
                  • Instruction Fuzzy Hash: A631C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Arrow Right]
                  • API String ID: 783433895-2747614471
                  • Opcode ID: aca24b8e51f7e3e1dab343980e379713395e851feaea9de910577454060b53af
                  • Instruction ID: d55769cdf0c3d80231fc2ac86e76adf7b4e32c99f9af14db686804d95fffef21
                  • Opcode Fuzzy Hash: aca24b8e51f7e3e1dab343980e379713395e851feaea9de910577454060b53af
                  • Instruction Fuzzy Hash: 3931C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489B24ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Right Alt]
                  • API String ID: 783433895-444060433
                  • Opcode ID: d9417e567954be7a013c4a1f352142b679dc3c107156d497e706b0c1705b6daf
                  • Instruction ID: afd7f63f49bfae50f92b7a44b0612bc8afbb30cc7fb8ea37a6cc1a6026fb1e9c
                  • Opcode Fuzzy Hash: d9417e567954be7a013c4a1f352142b679dc3c107156d497e706b0c1705b6daf
                  • Instruction Fuzzy Hash: 4231C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489724ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Scrol Lock]
                  • API String ID: 783433895-3106752957
                  • Opcode ID: 7d739420cde52f5cdf23b0552a77265f6848328848d1a0f3863d68950f1cd5c9
                  • Instruction ID: 538bcb97e9cdfd1a49afb72e3ad707114e7046f27a94ba55a28649c3e7b83c1d
                  • Opcode Fuzzy Hash: 7d739420cde52f5cdf23b0552a77265f6848328848d1a0f3863d68950f1cd5c9
                  • Instruction Fuzzy Hash: 7031C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Sleep]
                  • API String ID: 783433895-3656392610
                  • Opcode ID: 4f42286bcb9d2d57705b4f68fa1ae7d45a5f494e57315e7dc3e0b652194aa4b2
                  • Instruction ID: 0f1bd7a52d7bab131bf13330daa87dc6c7aebe1a4c65384e0524c1501f8f18d4
                  • Opcode Fuzzy Hash: 4f42286bcb9d2d57705b4f68fa1ae7d45a5f494e57315e7dc3e0b652194aa4b2
                  • Instruction Fuzzy Hash: A031C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Print Screen]
                  • API String ID: 783433895-3743399299
                  • Opcode ID: 1ddbb06d12cae7f61712b76396317ea06106a7346feb82e8f9531a385193e155
                  • Instruction ID: ab27b4f068ad1f5cf43c9d8905a98d245769d77d18c34ebd10b41bde0b20419d
                  • Opcode Fuzzy Hash: 1ddbb06d12cae7f61712b76396317ea06106a7346feb82e8f9531a385193e155
                  • Instruction Fuzzy Hash: 8231C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489724ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Arrow Up]
                  • API String ID: 783433895-3327686714
                  • Opcode ID: 83203669f0511a29086e5a836e6f4c0065e3a22eefa3cde518e48db2ad99b6a3
                  • Instruction ID: b80a0d9e46f3fa67cf2931779c914642823d7e923a8a23d77be412dba9eacf16
                  • Opcode Fuzzy Hash: 83203669f0511a29086e5a836e6f4c0065e3a22eefa3cde518e48db2ad99b6a3
                  • Instruction Fuzzy Hash: 8631C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Volume Down]
                  • API String ID: 783433895-1488893751
                  • Opcode ID: 304b93c83e960425b2644ed9c30a8069e95f38cdf27668f700968b4d8be163ed
                  • Instruction ID: 36b4c4fc11892ac8fc2660bbf295ac53e9d52ac89c47b39cb3f3571394c4b765
                  • Opcode Fuzzy Hash: 304b93c83e960425b2644ed9c30a8069e95f38cdf27668f700968b4d8be163ed
                  • Instruction Fuzzy Hash: 4D31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489724ECAB8EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Volume Mute]
                  • API String ID: 783433895-2344092975
                  • Opcode ID: 455afcd6e3832ca7b84d94a3bb7d8776a597c069f1cf387fb9e20d828b192e7e
                  • Instruction ID: 16984cad3dea769ffc9e719f0c3c6e6ae58df65779da4dd1961d81e5b5ee2c4d
                  • Opcode Fuzzy Hash: 455afcd6e3832ca7b84d94a3bb7d8776a597c069f1cf387fb9e20d828b192e7e
                  • Instruction Fuzzy Hash: 1231C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489724ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad$[Volume Up]
                  • API String ID: 783433895-1130620078
                  • Opcode ID: 1396860a42cb380e9acc2e04de6d3966a62f39ee4fc40e43a8010b9064b996bb
                  • Instruction ID: 44a22ba6fee8b4e9f78c922aeec61573fdb0a25af906651eec748b7687c73eda
                  • Opcode Fuzzy Hash: 1396860a42cb380e9acc2e04de6d3966a62f39ee4fc40e43a8010b9064b996bb
                  • Instruction Fuzzy Hash: A131C0B8B042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489724ECA78EE458761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 1000282E
                  • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,1000287D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 10002861
                  • RegCloseKey.ADVAPI32(?,10002884,00000000,?,00000004,00000000,1000287D,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 10002877
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                  • API String ID: 3677997916-4173385793
                  • Opcode ID: 2de27d201efc82a7483fe1fc3ca906961f394501151e49489695f63c5642027c
                  • Instruction ID: 58881b6b02d8723bd0b6b44eaf0a35f8982818fe5ca11f09a28713a058d90beb
                  • Opcode Fuzzy Hash: 2de27d201efc82a7483fe1fc3ca906961f394501151e49489695f63c5642027c
                  • Instruction Fuzzy Hash: 7501F77D900249BAFB15DBA0CC42FE9B3BCEB08780F5040A1FB00E7598EB70AA50D765
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 470584828-3409537306
                  • Opcode ID: d00852749f0fa98736970e4bd149b739843efba6f4ddf0c6cc158de6b8264dba
                  • Instruction ID: 149ee91c77b329ac99fc9af66e0b3d6a30fb45bb34e994fec82f682e2bcf3d65
                  • Opcode Fuzzy Hash: d00852749f0fa98736970e4bd149b739843efba6f4ddf0c6cc158de6b8264dba
                  • Instruction Fuzzy Hash: B43123B8F042545BF722D7648C85B9F73A9FF892C0F10C096F5489724ECA78AE49CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: f7aef9f21616257945c88be8e333fc38432ac4e89a882b8b49a9e8d0194266b7
                  • Instruction ID: b9b3ae13005e08ec592b66eecad70d017cc54a4a4b75dc847ff917e2bac9dbd1
                  • Opcode Fuzzy Hash: f7aef9f21616257945c88be8e333fc38432ac4e89a882b8b49a9e8d0194266b7
                  • Instruction Fuzzy Hash: DF31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE49CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: 4ab29850c5f1ea5968f8bdd8de0f37538667ca36111ee2f0d472207cb48857ef
                  • Instruction ID: 3a51f266618fbb6b802821ae4c3cebfa16a004a881c451f646cc2ee8cf1695e6
                  • Opcode Fuzzy Hash: 4ab29850c5f1ea5968f8bdd8de0f37538667ca36111ee2f0d472207cb48857ef
                  • Instruction Fuzzy Hash: 1231C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: 60778e521d3828b1ac1843a7a9634b6a047fd589048255cd8357fb5c81321ec6
                  • Instruction ID: 6a83edecdd09e7cf6567bb4e12f854a4e7878076b54641c7a23d56263201f881
                  • Opcode Fuzzy Hash: 60778e521d3828b1ac1843a7a9634b6a047fd589048255cd8357fb5c81321ec6
                  • Instruction Fuzzy Hash: 6C31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: f4a8bbbe697522b7cb839a06d61e9bc714ef5e6879113a86d806209f1cea9cc7
                  • Instruction ID: b1ba141e3efd31ddec5efd417cab8458379c596905762369eb56fe309a4f9560
                  • Opcode Fuzzy Hash: f4a8bbbe697522b7cb839a06d61e9bc714ef5e6879113a86d806209f1cea9cc7
                  • Instruction Fuzzy Hash: CA31C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: 39b03309cb925559adc94f9655e3a5a9f0f01a3343eadd4f371930683951da97
                  • Instruction ID: 8aa69b91d737cd1935abe9d1b170b80890827fc85faedbd8b906090cccbd213a
                  • Opcode Fuzzy Hash: 39b03309cb925559adc94f9655e3a5a9f0f01a3343eadd4f371930683951da97
                  • Instruction Fuzzy Hash: EB31C2B8F042545BF722C7658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45C761
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: a162cc495929e47f1e2b8db7e60090edff99d25f5f2755788ca8ad98c3a46845
                  • Instruction ID: da241092db117cf8670937f7e946dbca7f1b2fe6bc2353ea6322e4b84d0426b2
                  • Opcode Fuzzy Hash: a162cc495929e47f1e2b8db7e60090edff99d25f5f2755788ca8ad98c3a46845
                  • Instruction Fuzzy Hash: B031C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB62
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: 6fb5cf8c127330519ac590d7b260d6f1972dd4d19386bf32214d38e0e73a7627
                  • Instruction ID: 13d384bfb7d80fcaab74c7c21edcce233b970dd7a99a864e689220d7ee6072be
                  • Opcode Fuzzy Hash: 6fb5cf8c127330519ac590d7b260d6f1972dd4d19386bf32214d38e0e73a7627
                  • Instruction Fuzzy Hash: E831C0B8F042545BF722CB658C85B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: b4064cf9196f1bd766f61690eec419dae147e0aac919e4e137b35742a66dca64
                  • Instruction ID: bead1d8953916fe6a2caf6aa6abcbb8af6aaada5367ea8c14ed574beb6cc7c0d
                  • Opcode Fuzzy Hash: b4064cf9196f1bd766f61690eec419dae147e0aac919e4e137b35742a66dca64
                  • Instruction Fuzzy Hash: E631C0B8F042545BF722CB658C85B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: ad526f3a44082b4da89a5289e758324e4cba0574a2e660b1230691faf556a316
                  • Instruction ID: 311b08e60e3b521a7c3a0356ba3012efa993796664cd4508c3663b1c0811d3ac
                  • Opcode Fuzzy Hash: ad526f3a44082b4da89a5289e758324e4cba0574a2e660b1230691faf556a316
                  • Instruction Fuzzy Hash: 9131C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: 3018831f3d2d7d46207b6938651625027ba0aae8da63efaf5cfa44b6499e9dc2
                  • Instruction ID: 74b2e92b555be62d4c67bea0bf12e908dc11cad6fd28d16d482c19b7e5004677
                  • Opcode Fuzzy Hash: 3018831f3d2d7d46207b6938651625027ba0aae8da63efaf5cfa44b6499e9dc2
                  • Instruction Fuzzy Hash: 9B31C0B8F042545BF722DB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: 58d40c07809cf6c1f88f00f7cd4d01a1027e2dbe51f130ce30c58b48c389b237
                  • Instruction ID: 033e83d321774fcd4bda94542bc8b64ee5515bfb92d199e6e3b91a957bdcd820
                  • Opcode Fuzzy Hash: 58d40c07809cf6c1f88f00f7cd4d01a1027e2dbe51f130ce30c58b48c389b237
                  • Instruction Fuzzy Hash: 0831C0B8F042545BF722CB658C45B9F73A9FB882C0F50C0A5F5489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 100037AC: SysReAllocStringLen.OLEAUT32(1000D0D0,1000CFDC,00000002), ref: 100037C2
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 10007754
                  • ToUnicodeEx.USER32(?,?,?,?,00000100,00000000,?), ref: 100077F8
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 1000784E
                  • MapVirtualKeyW.USER32(0000006E,00000001), ref: 10007871
                  • ToUnicodeEx.USER32(0000006E,00000000,0000006E,00000001,?,?,00000100), ref: 10007879
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Unicode$Virtual$AllocString
                  • String ID: KeyDelBackspace$Numpad
                  • API String ID: 783433895-3409537306
                  • Opcode ID: aa20c933a58f2305242e8b78a34cde6f3360a0dc9dcf15ed5906f17daae1d160
                  • Instruction ID: c55d23e60b6bc9fae09bc4a5971d47f8544ea9c2ea09269a4cd522e11abc3ca6
                  • Opcode Fuzzy Hash: aa20c933a58f2305242e8b78a34cde6f3360a0dc9dcf15ed5906f17daae1d160
                  • Instruction Fuzzy Hash: 5E31C0B8F042545BF722CB658C45B9F73A9FB892C0F50C0A5F6489720ECA78EE45CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateFreeStringValue
                  • String ID: restart$%SERVER%$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath
                  • API String ID: 523044198-2142522223
                  • Opcode ID: 364ad897bbca38481dd1a11b2b492bd1a693bcb91c63773ed721ecd4ba2295bf
                  • Instruction ID: ccd5ba8bb55e14e3b401f0629b5d5422583a699d941ac8acb34279bb9c56e552
                  • Opcode Fuzzy Hash: 364ad897bbca38481dd1a11b2b492bd1a693bcb91c63773ed721ecd4ba2295bf
                  • Instruction Fuzzy Hash: A4619438A0415D9FEB25C750C881BDEB3BEEF45380F8081D6A908A768ADB756F85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateFreeStringValue
                  • String ID: restart$%SERVER%$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath
                  • API String ID: 523044198-2142522223
                  • Opcode ID: 70bc63b1d7bf7f2434c0fd2a984a390c0a29f6a211df66fcb658c6ec4d215a6a
                  • Instruction ID: 7bb9cab796adacb123c590501e10766ab110edc906df9b0df81ab3aad42e102a
                  • Opcode Fuzzy Hash: 70bc63b1d7bf7f2434c0fd2a984a390c0a29f6a211df66fcb658c6ec4d215a6a
                  • Instruction Fuzzy Hash: 23619438A0415D9BEB25C750C881BDEB3BEEF45380F8081D6A908A764ADB756F85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CloseCreateFreeStringValue
                  • String ID: restart$%SERVER%$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath
                  • API String ID: 523044198-2142522223
                  • Opcode ID: 6a3a9802c04267f5677fb71fa8e26ddd48aad684d5027258f0195948b13e5c11
                  • Instruction ID: 51db14d9a78096dfca6e0b2c0cac839b55e5a7d9a5be764b8c5632986f08cd1f
                  • Opcode Fuzzy Hash: 6a3a9802c04267f5677fb71fa8e26ddd48aad684d5027258f0195948b13e5c11
                  • Instruction Fuzzy Hash: B5619338A0415D9BEB15D750C841BDEB3BEEF45380F8081E6A908A7249DB75AF85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: &amp;$&gt;$&lt;$&quot;$<br />
                  • API String ID: 0-2730314969
                  • Opcode ID: 0cd1edd9943d5066e4ed9cbb4ed191d6f01f5bec750c3f69ea3f40f0141da2ec
                  • Instruction ID: c2b4ba650b709cafa3e4efc2b6e91a51004f46039d2a3ae5a547a61f7c415082
                  • Opcode Fuzzy Hash: 0cd1edd9943d5066e4ed9cbb4ed191d6f01f5bec750c3f69ea3f40f0141da2ec
                  • Instruction Fuzzy Hash: 57314579A04189AFEF05DB94CC819DF77FDFB88680F509061F180A7209DA34AF028B65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 10009C28
                  • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,00000080), ref: 10009C70
                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,00000000,00000000,00000000,00000000,00000080), ref: 10009D57
                  • CopyFileW.KERNEL32(00000000,00000000,00000000,00000000,00000080,?,?,?,?,00000000,00000000,00000000,00000000,00000080), ref: 10009D95
                    • Part of subcall function 100053D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 10005406
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$AttributesCopy$DirectorySystem
                  • String ID:
                  • API String ID: 3443914049-0
                  • Opcode ID: 8ffb02acb12784a8fca7f00c8f7b14851c1630e5a7bcf1fe24323b8a2b1ac29b
                  • Instruction ID: 24b82f3418a54abe61ddf0e4c7a52c3359c66f211f63a1d8d7c84fd7e5013851
                  • Opcode Fuzzy Hash: 8ffb02acb12784a8fca7f00c8f7b14851c1630e5a7bcf1fe24323b8a2b1ac29b
                  • Instruction Fuzzy Hash: 02B12F3890455DDBEB21DB50CC81ADEB3B9EF803C1F4081E5A44AAB289DB71AF85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • GetDesktopWindow.USER32 ref: 10006571
                  • GetWindowRect.USER32 ref: 10006577
                  • GetModuleHandleA.KERNEL32(00000000,00000000,?,?,?), ref: 1000657E
                  • RegisterClassW.USER32 ref: 1000658A
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Window$ClassDesktopHandleModuleRectRegister
                  • String ID:
                  • API String ID: 805957598-0
                  • Opcode ID: a1c04505e5f5ba05ad93ee47a5be074ea14fb600836cbdd66e1b4b0242f25109
                  • Instruction ID: fd61cd8fe43509876bed775ba568f59b673aa19b24296d0bc6aff4bc23203f03
                  • Opcode Fuzzy Hash: a1c04505e5f5ba05ad93ee47a5be074ea14fb600836cbdd66e1b4b0242f25109
                  • Instruction Fuzzy Hash: AB2147B1F44205AFEB50CFB8DC41B9FB7E6EB08291F108075F508EB285E97195048794
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Class$InfoLongRegisterUnregisterWindow
                  • String ID:
                  • API String ID: 4025006896-0
                  • Opcode ID: 34ace1d3d250000ade5f731cbe714df2434c88e76e583f532eec8fd86c63c607
                  • Instruction ID: a184255e0aa6b19b8a700ba1ba5d869a571dd8ac557c0204472f9db7938aee9a
                  • Opcode Fuzzy Hash: 34ace1d3d250000ade5f731cbe714df2434c88e76e583f532eec8fd86c63c607
                  • Instruction Fuzzy Hash: DE01C4716041146BFB40DBA8CC91FAE33ADE7193C1F004722F505E76ADCA76EC848790
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RtlInitializeCriticalSection.KERNEL32(1000F5B8,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10001856
                  • RtlEnterCriticalSection.KERNEL32(1000F5B8,1000F5B8,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10001869
                  • LocalAlloc.KERNEL32(00000000,00000FF8,1000F5B8,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10001893
                  • RtlLeaveCriticalSection.KERNEL32(1000F5B8,100018FD,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 100018F0
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                  • String ID:
                  • API String ID: 730355536-0
                  • Opcode ID: 5f07fa945b9f97fba898828a93f290c0886c6dfe5430a6f63fb956d26b2ed7b2
                  • Instruction ID: dccb1d46fb8802896221657e2b19eaefe2a155e583b8e496b0545f4226b1fe46
                  • Opcode Fuzzy Hash: 5f07fa945b9f97fba898828a93f290c0886c6dfe5430a6f63fb956d26b2ed7b2
                  • Instruction Fuzzy Hash: 1101C0B49046909EF706DF688C417F83A95EB493C2F84807DE31086EAECF755541E715
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10005CA4: FindFirstFileW.KERNEL32(00000000,?,00000000,1000D3CA,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005CAF
                    • Part of subcall function 10005CA4: FindClose.KERNEL32(00000000,00000000,?,00000000,1000D3CA,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005CBC
                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E67
                  • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E71
                  • ReadFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E99
                  • CloseHandle.KERNEL32(00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 10005E9F
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseFind$CreateFirstHandleReadSize
                  • String ID:
                  • API String ID: 2300874643-0
                  • Opcode ID: 82852cc2d8d25f5b7718ff9a34c6f0df449e81a1205941d0d4bd8c9d85c04275
                  • Instruction ID: ec1664e735d5352034fe0f720539986a8c554a57553e37fb55f78792c2cbbe85
                  • Opcode Fuzzy Hash: 82852cc2d8d25f5b7718ff9a34c6f0df449e81a1205941d0d4bd8c9d85c04275
                  • Instruction Fuzzy Hash: 7701FBB4204300AFF750DF68DC82F5BB7D8DF48740F118929B6C8DB2D6EAB5A8408756
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                    • Part of subcall function 10005CA4: FindFirstFileW.KERNEL32(00000000,?,00000000,1000D3CA,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005CAF
                    • Part of subcall function 10005CA4: FindClose.KERNEL32(00000000,00000000,?,00000000,1000D3CA,.cfg,?,?,00000002,?,80000001,00000000,00008007,00000000,1000D759), ref: 10005CBC
                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 1000CF37
                  • GetFileSize.KERNEL32(00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 1000CF41
                  • ReadFile.KERNEL32(00000000,10012588,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 1000CF5D
                  • CloseHandle.KERNEL32(00000000,00000000,10012588,?,?,00000000,00000000,00000000,00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 1000CF63
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: File$CloseFind$CreateFirstHandleReadSize
                  • String ID:
                  • API String ID: 2300874643-0
                  • Opcode ID: ddf39b76d56c946fe45e4c4f9f5b41c086577163610c8dbb6f6595d30d890769
                  • Instruction ID: 0a6ea64837ac90d6558c1ae8266d2dbde50220b88be3e9169680d92fb0307424
                  • Opcode Fuzzy Hash: ddf39b76d56c946fe45e4c4f9f5b41c086577163610c8dbb6f6595d30d890769
                  • Instruction Fuzzy Hash: 54F012B42443007EF710DB689CC2F5B77DDDF84790F118929B6889B2C6DAB5A8008756
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 10006033
                  • TranslateMessage.USER32 ref: 1000603F
                  • DispatchMessageA.USER32 ref: 10006045
                  • Sleep.KERNEL32(00000005,?,?,10006062), ref: 1000604C
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: Message$DispatchPeekSleepTranslate
                  • String ID:
                  • API String ID: 3768732053-0
                  • Opcode ID: cdfd25f36f656fbcf1ff338a95777bde3114a2653ddc5fdf0504e6a1debc9aed
                  • Instruction ID: b6454b735261936b655b95e10bb9b448ccac05162160f127df45d4e102083895
                  • Opcode Fuzzy Hash: cdfd25f36f656fbcf1ff338a95777bde3114a2653ddc5fdf0504e6a1debc9aed
                  • Instruction Fuzzy Hash: 8AD052B53C2A253AF520A1A00C83FAF004DCF02BC6F220030B700BA0CACE867C0102AE
                  Uniqueness

                  Uniqueness Score: -1.00%

                  APIs
                  • RtlEnterCriticalSection.KERNEL32(1000F5B8,00000000,u,?,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10002110
                  • RtlLeaveCriticalSection.KERNEL32(1000F5B8,10002255,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10002248
                    • Part of subcall function 10001840: RtlInitializeCriticalSection.KERNEL32(1000F5B8,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10001856
                    • Part of subcall function 10001840: RtlEnterCriticalSection.KERNEL32(1000F5B8,1000F5B8,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10001869
                    • Part of subcall function 10001840: LocalAlloc.KERNEL32(00000000,00000FF8,1000F5B8,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 10001893
                    • Part of subcall function 10001840: RtlLeaveCriticalSection.KERNEL32(1000F5B8,100018FD,00000000,100018F6,?,?,100020DA,1000F5F8,00000000,00000000,?,?,10001AC9,10001ADE,10001C2F), ref: 100018F0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.389752210.0000000010001000.00000020.00000001.01000000.00000003.sdmp, Offset: 10000000, based on PE: true
                  • Associated: 00000000.00000002.389735949.0000000010000000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389771171.000000001000E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389805329.0000000010044000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389816427.0000000010047000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389841317.000000001004A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389927958.0000000010058000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389934203.000000001005A000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389980663.000000001006B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.389996603.0000000010079000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390000506.000000001007B000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.390008615.0000000010083000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_10000000_gKi3fKq4Kh.jbxd
                  Yara matches
                  Similarity
                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                  • String ID: u
                  • API String ID: 2227675388-1454174257
                  • Opcode ID: 0381b4d275836edba91e48a056a1c546f7dfe9bb6bc52416cd0fc2a3e6f7adc3
                  • Instruction ID: 561d0a3fabbc271b0414227351a2afb4dd9cd87895bc161ef682a7dca5e6893d
                  • Opcode Fuzzy Hash: 0381b4d275836edba91e48a056a1c546f7dfe9bb6bc52416cd0fc2a3e6f7adc3
                  • Instruction Fuzzy Hash: 8E413436A04660EFF311CFA4CD897A937E5EB443D4F24812DEA0087ABEC7349884E701
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: SOFTWARE\$ServerName$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath$advapi32.dll$comctl32.dll$gdi32.dll$kernel32.dll$mpr.dll$msimg32.dll$open$opengl32.dll$shell32.dll$user32.dll$version.dll$wintrust.dll
                  • API String ID: 0-1620131929
                  • Opcode ID: 3f003b5c3092192cfd81708055f069769660bd1ffedbc504d52b734bcf9630d0
                  • Instruction ID: 2f4b2620837c28cfdf5e49335ff29dada521f5c21c6ac21027946eb6f57ed48d
                  • Opcode Fuzzy Hash: 3f003b5c3092192cfd81708055f069769660bd1ffedbc504d52b734bcf9630d0
                  • Instruction Fuzzy Hash: 20911F78A4024DABFB01EBA4D882FDE7779EF442C1F118162F9046B28ECB75BD058765
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f70b2c41885a2b75705e30fc840686dfb1265623bc9199f295252585e81511e0
                  • Instruction ID: 0d43bb01e54dc9b671ab70bbc6831eaed9bab68177c8673266180e336cb24133
                  • Opcode Fuzzy Hash: f70b2c41885a2b75705e30fc840686dfb1265623bc9199f295252585e81511e0
                  • Instruction Fuzzy Hash: 9211E135B0864657F323C969ACC086BA3CEDFC41E0B14C439B964C734ADEA9ED099241
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 658d5346f56e2b90820d1a4238b762dd8e40d303793816f207723b6d5c2275ec
                  • Instruction ID: 376a20137c8c7a1c0fe805d4ca5c7b4e53bfabd2decc6611af020c1a5c038b4e
                  • Opcode Fuzzy Hash: 658d5346f56e2b90820d1a4238b762dd8e40d303793816f207723b6d5c2275ec
                  • Instruction Fuzzy Hash: 42117076A05B029BE310DF19CC80A9AB7E1EBC47D2F15C52CE6894B759D630EC408A81
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9d51b0ecb197f6104a2e181751b16b33db407c9c73752bb5c84ac1d3e4f38b51
                  • Instruction ID: a9c88282e432f8f48e60550f2442f7a71b9eebfe68f090cfd9eaf30bd27f6b92
                  • Opcode Fuzzy Hash: 9d51b0ecb197f6104a2e181751b16b33db407c9c73752bb5c84ac1d3e4f38b51
                  • Instruction Fuzzy Hash: 82F0A7B6B0062027F730C9694C81BCA66C5DF86BE1F154270FF48EF7CEDA619C0082A0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f526a8682a1746ab478b9ff0de63cbf056aa175396c796edc7b027d709aef71d
                  • Instruction ID: c2faabbd69db4d94be3e596462244fa43c21c6edc70b3a96aead2daf1922e93e
                  • Opcode Fuzzy Hash: f526a8682a1746ab478b9ff0de63cbf056aa175396c796edc7b027d709aef71d
                  • Instruction Fuzzy Hash: 9EC012B22802083EF600CA88CC46FB3329CC348B80F008108F704CA180C0A1BC2046B8
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                  • Instruction ID: 5a3873c4f99191ebd0c5874248a48e85116967648e1c4cce01420d804b7247f1
                  • Opcode Fuzzy Hash: 21e0619b74412fae9514185c35c6bd95fbb7b52f213a822672066e7264c0ded7
                  • Instruction Fuzzy Hash: 20C012B71A024CAB8B00EEA9CC06D9B33DCAB28609B008825B928CB100C539E5909B60
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8bafc26852eecdc6c12b55ba738ab9fa026e6a82810d81ad4c3fd3d0f1dab815
                  • Instruction ID: ca28794199431f72530e799d36250414a245c489da467331e40bdcc928d85e60
                  • Opcode Fuzzy Hash: 8bafc26852eecdc6c12b55ba738ab9fa026e6a82810d81ad4c3fd3d0f1dab815
                  • Instruction Fuzzy Hash: 6BC08CFC1052022CBF0AAB3148859BB639CEF801C13408068BA04C4008D634E8814020
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: .cfg$.dat$.xtr$InstalledServer$SOFTWARE\$ServerName$ServerStarted$\Microsoft\Windows\$advapi32.dll$comctl32.dll$gdi32.dll$kernel32.dll$mpr.dll$msimg32.dll$opengl32.dll$shell32.dll$user32.dll$version.dll$wintrust.dll
                  • API String ID: 0-3293355523
                  • Opcode ID: bde0dd1c3b5265f9cabb2d91f526b3a14c8d9b38cf1c088a702092fb281a6550
                  • Instruction ID: 1bb01a822c3cd363219a61f58cecc4d3cd4d7df1aa5892b4b649a7b9097d74e2
                  • Opcode Fuzzy Hash: bde0dd1c3b5265f9cabb2d91f526b3a14c8d9b38cf1c088a702092fb281a6550
                  • Instruction Fuzzy Hash: 58128D7890025D9BEB21DB50CC82EDEB3B9EF84381F4080E5E5096B299DB71BF858F55
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: .cfg$CONFIG$LP$Mutex$SOFTWARE\XtremeRAT$TP$\1P$\Microsoft\Windows\$open$restart$svchost.exe$update$wzk5VL6RM0QU9blk$wzk5VL6RM0QU9blkPERSIST$O
                  • API String ID: 0-4244430324
                  • Opcode ID: b25be51fba2d0f65df071fbb7db729566f5925429d87ceaf1aa7f8b9bf906716
                  • Instruction ID: 7babdffad351a71ae314de662e95e98ead1dbb94228c143735747afee298a140
                  • Opcode Fuzzy Hash: b25be51fba2d0f65df071fbb7db729566f5925429d87ceaf1aa7f8b9bf906716
                  • Instruction Fuzzy Hash: E2E1B5787005559BF715E764CC82B9FB3AAEB803C0F508061F5489B29EEEB5FE418B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: $ --- $</font>$<FONT COLOR="blue">[$<FONT COLOR="red">[Clipboard$<FONT COLOR="red">[Clipboard End]</font>$LastSize$SOFTWARE\$]</font>$qualquercoisarsrsr$temp
                  • API String ID: 0-3009520543
                  • Opcode ID: 779d53ca8fe55552b1ceab16a14ff218901e1d0717973ec1ab609bf966c74ce1
                  • Instruction ID: 057d20e264fa80afaee32c8a6c883f4daf1d9cc34b90863f49a2566050bc1c08
                  • Opcode Fuzzy Hash: 779d53ca8fe55552b1ceab16a14ff218901e1d0717973ec1ab609bf966c74ce1
                  • Instruction Fuzzy Hash: 6DF16F74A00219ABFB51DB64CC81FDE73B9FB083C0F508065F148A72ADDB75AE858B65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: RECYCLER\$RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$[autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$action=Open folder to view files$autorun.inf$icon=shell32.dll,4$label=PENDRIVE$shell\Open=Open$shell\Open\Default=1$shell\Open\command=$shellexecute=
                  • API String ID: 0-631342129
                  • Opcode ID: 13ecfe44ea8818081acd79cdab56d55be9f714c6c0a79ac0d907a72402bacc2f
                  • Instruction ID: e38e5125926d32c1d26ff353fbb275c64c03e2d6fa0b8cc01eec99beb1e39287
                  • Opcode Fuzzy Hash: 13ecfe44ea8818081acd79cdab56d55be9f714c6c0a79ac0d907a72402bacc2f
                  • Instruction Fuzzy Hash: CA616334909688AFEB03DF64CC519DEBF75DF46280B5580E6F040AB15BD774AE05CB61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: RECYCLER\$RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$[autorun];open=RECYCLER\S-1-5-21-1482476501-3352491937-682996330-1013\$action=Open folder to view files$autorun.inf$icon=shell32.dll,4$label=PENDRIVE$shell\Open=Open$shell\Open\Default=1$shell\Open\command=$shellexecute=
                  • API String ID: 0-631342129
                  • Opcode ID: f3564a97d53de12c9b48bdf10bff330839f6c1832b8590ef24407a4c5debb447
                  • Instruction ID: 6ae93d5114324f60805c066673cfebbd25bb18d06d828e6891266f46ee2437b0
                  • Opcode Fuzzy Hash: f3564a97d53de12c9b48bdf10bff330839f6c1832b8590ef24407a4c5debb447
                  • Instruction Fuzzy Hash: 71410E38900909ABEB05EF94CD82DDEB7B9EF44281F90C165F500B725EDB71BE058BA0
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                  • API String ID: 0-909552448
                  • Opcode ID: 19a7d89fdd0d4a8943666261cc10e3fb7835feb1d7da3395f8e32f4d42fefbdb
                  • Instruction ID: 07abd4759daa604870a4f77bd8534178fed91fd4fee8f89ff290bb29f67fd9b2
                  • Opcode Fuzzy Hash: 19a7d89fdd0d4a8943666261cc10e3fb7835feb1d7da3395f8e32f4d42fefbdb
                  • Instruction Fuzzy Hash: E5211D38B041C99BF711DA99858295FB3E9DB8D7C2FB08091B8415731EDB37BF019622
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: .functions$ENDSERVERBUFFER$STARTSERVERBUFFER$URLMON.DLL$XTREME$http://$shell32.dll
                  • API String ID: 0-4263465085
                  • Opcode ID: 470b965d5662e412d8179e10860a8eacdfdba3da0a7e451b88e4202af90a0bea
                  • Instruction ID: 095f8cd7e1ad7f54d17a8aaba90678f4abf6843293fa25502bb1c2560b129c41
                  • Opcode Fuzzy Hash: 470b965d5662e412d8179e10860a8eacdfdba3da0a7e451b88e4202af90a0bea
                  • Instruction Fuzzy Hash: 3FB14D78A001199BEB11DBA4CC82ADFB7B9FF44380F5081A5F504A765ADB74AF858F50
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  • </body>, xrefs: 10008F43
                  • LastSize, xrefs: 10009028
                  • SOFTWARE\, xrefs: 1000901B
                  • FTP, xrefs: 1000903A
                  • <html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>, xrefs: 10008F3B
                  • </html>, xrefs: 10008F4D
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: </body>$</html>$<html><meta http-equiv="Content-Type" content="text/html;charset=UTF-8"><head><title>Xtreme RAT</title></head><body>$FTP$LastSize$SOFTWARE\
                  • API String ID: 0-265700797
                  • Opcode ID: 70478f3f3047d89982752d3640f3cec2226bc33a26c5257581dd13bee4673461
                  • Instruction ID: 9ae569672a167bc613e47318ba2929e521b2e386b238916fb1c1f90ba9e27590
                  • Opcode Fuzzy Hash: 70478f3f3047d89982752d3640f3cec2226bc33a26c5257581dd13bee4673461
                  • Instruction Fuzzy Hash: 2C814D74A00259AFFB10DFA8CC85FEE77F9FB08380F508119F544A72A9CB75A9458B64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: frgjbfdkbnfsdjbvofsjfrfre$gsegtsrgrefsfsfsgrsgrt$hgtrfsgfrsgfgregtregtr$jiejwogfdjieovevodnvfnievn$jytjyegrsfvfbgfsdf$trhgtehgfsgrfgtrwegtre
                  • API String ID: 0-2672052065
                  • Opcode ID: eaca480185e3529857f08a7b99fa4587865511e38ce0a633c86f9ec4ba4854cf
                  • Instruction ID: ed3f77de684bd0d246fe2b552f76a464aac7a3f76a0323551fd1ca8e49655e55
                  • Opcode Fuzzy Hash: eaca480185e3529857f08a7b99fa4587865511e38ce0a633c86f9ec4ba4854cf
                  • Instruction Fuzzy Hash: 8BF0F9794192116EF701DF714C6697B7698E7453C13818529F5C882A3DDF3358059BE1
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: frgjbfdkbnfsdjbvofsjfrfre$gsegtsrgrefsfsfsgrsgrt$hgtrfsgfrsgfgregtregtr$jiejwogfdjieovevodnvfnievn$jytjyegrsfvfbgfsdf$trhgtehgfsgrfgtrwegtre
                  • API String ID: 0-2672052065
                  • Opcode ID: 0db88cb41446c7a1772992425046f1e51f35a21a88b435333acbf191ec07eeb4
                  • Instruction ID: 4cd3ad10a4a29e5a40757261822789eba1ab52c8d76854998792a07700413263
                  • Opcode Fuzzy Hash: 0db88cb41446c7a1772992425046f1e51f35a21a88b435333acbf191ec07eeb4
                  • Instruction Fuzzy Hash: EDF0F4B94192116EF701DFB18C6A97B7A98E7453C13818529E6C882A3DDF331405ABE2
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: .exe$.xtr$BINDER$SOFTWARE\$open
                  • API String ID: 0-3085899294
                  • Opcode ID: a17296029010211923f33a32a025bfe9590920d378f998e5d8a670387b69a70f
                  • Instruction ID: e2e431fa4438d6138b358157023902ea7bce804184865157e4dc89de6df5abab
                  • Opcode Fuzzy Hash: a17296029010211923f33a32a025bfe9590920d378f998e5d8a670387b69a70f
                  • Instruction Fuzzy Hash: 33C11C38A005199BFB25DB54CC82BCFB3B9EB84381F5080B5B509AB249DE75FE858F51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: restart$%SERVER%$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath
                  • API String ID: 0-2142522223
                  • Opcode ID: 364ad897bbca38481dd1a11b2b492bd1a693bcb91c63773ed721ecd4ba2295bf
                  • Instruction ID: ccd5ba8bb55e14e3b401f0629b5d5422583a699d941ac8acb34279bb9c56e552
                  • Opcode Fuzzy Hash: 364ad897bbca38481dd1a11b2b492bd1a693bcb91c63773ed721ecd4ba2295bf
                  • Instruction Fuzzy Hash: A4619438A0415D9FEB25C750C881BDEB3BEEF45380F8081D6A908A768ADB756F85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: restart$%SERVER%$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath
                  • API String ID: 0-2142522223
                  • Opcode ID: 70bc63b1d7bf7f2434c0fd2a984a390c0a29f6a211df66fcb658c6ec4d215a6a
                  • Instruction ID: 7bb9cab796adacb123c590501e10766ab110edc906df9b0df81ab3aad42e102a
                  • Opcode Fuzzy Hash: 70bc63b1d7bf7f2434c0fd2a984a390c0a29f6a211df66fcb658c6ec4d215a6a
                  • Instruction Fuzzy Hash: 23619438A0415D9BEB25C750C881BDEB3BEEF45380F8081D6A908A764ADB756F85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: restart$%SERVER%$Software\Microsoft\Active Setup\Installed Components\$Software\Microsoft\Windows\CurrentVersion\Run$StubPath
                  • API String ID: 0-2142522223
                  • Opcode ID: 6a3a9802c04267f5677fb71fa8e26ddd48aad684d5027258f0195948b13e5c11
                  • Instruction ID: 51db14d9a78096dfca6e0b2c0cac839b55e5a7d9a5be764b8c5632986f08cd1f
                  • Opcode Fuzzy Hash: 6a3a9802c04267f5677fb71fa8e26ddd48aad684d5027258f0195948b13e5c11
                  • Instruction Fuzzy Hash: B5619338A0415D9BEB15D750C841BDEB3BEEF45380F8081E6A908A7249DB75AF85CF51
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: ENDSERVERBUFFER$STARTSERVERBUFFER$URLMON.DLL$XTREME$shell32.dll
                  • API String ID: 0-2417524110
                  • Opcode ID: 713050decec376a8e5de2e79cbc70c6421a00f6f369ebb3c5e82f8a6782ac755
                  • Instruction ID: 30b3ef76a2a80ae0936852672a2bbee531ad642fb2a80bd77bca9c30e5cd02f7
                  • Opcode Fuzzy Hash: 713050decec376a8e5de2e79cbc70c6421a00f6f369ebb3c5e82f8a6782ac755
                  • Instruction Fuzzy Hash: 7F418D78A141199BEB11DBA4CC82BEFB3B9FF44380F508165F504A728ADB34BE418B64
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: &amp;$&gt;$&lt;$&quot;$<br />
                  • API String ID: 0-2730314969
                  • Opcode ID: 0cd1edd9943d5066e4ed9cbb4ed191d6f01f5bec750c3f69ea3f40f0141da2ec
                  • Instruction ID: c2b4ba650b709cafa3e4efc2b6e91a51004f46039d2a3ae5a547a61f7c415082
                  • Opcode Fuzzy Hash: 0cd1edd9943d5066e4ed9cbb4ed191d6f01f5bec750c3f69ea3f40f0141da2ec
                  • Instruction Fuzzy Hash: 57314579A04189AFEF05DB94CC819DF77FDFB88680F509061F180A7209DA34AF028B65
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: $ --- $</font>$<FONT COLOR="blue">[
                  • API String ID: 0-341333612
                  • Opcode ID: 844369069b05dfd62b440b7fafa7b9f06d8a9886853feb290a734d0b2ba6acd8
                  • Instruction ID: 82ed3cb906cd8235e36a84cac39b9343783464e2b4201940a396f7c820685ddb
                  • Opcode Fuzzy Hash: 844369069b05dfd62b440b7fafa7b9f06d8a9886853feb290a734d0b2ba6acd8
                  • Instruction Fuzzy Hash: 6F513A78A00119AFEB11DB94CC81FDEB7B9FB48380F5084A1F548A7269DB31BF458B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: LastSize$SOFTWARE\$XtremeKeylogger$qualquercoisarsrsr
                  • API String ID: 0-193067991
                  • Opcode ID: b8b35e645ddaf236c2101e74a19ca3d57dbe3ac871cbe1f58d3791964739a7a7
                  • Instruction ID: e10228e688af51e092dac2c6f3dee7a218e45a64ed0b3a8379d93de067ea2b0a
                  • Opcode Fuzzy Hash: b8b35e645ddaf236c2101e74a19ca3d57dbe3ac871cbe1f58d3791964739a7a7
                  • Instruction Fuzzy Hash: 86415E78604251AFF711EB70CC92F6E37A9E7483C0F518029F144AB6FECEB6A8419751
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: .html$FTP$LastSize$SOFTWARE\
                  • API String ID: 0-3487691436
                  • Opcode ID: f64d9703497d1778a1f724dcd6172282dd11fce0a9d43a36a9a9269ada9e7162
                  • Instruction ID: 1ef3a85e4ac3c80801a06b688fa0acd6d065186ae52865efd5065228073e7574
                  • Opcode Fuzzy Hash: f64d9703497d1778a1f724dcd6172282dd11fce0a9d43a36a9a9269ada9e7162
                  • Instruction Fuzzy Hash: 9F317078500145BFF705DB64CD81BAF77ADEB453C0F904129F440AB6BACBB2AD509B61
                  Uniqueness

                  Uniqueness Score: -1.00%

                  Strings
                  Memory Dump Source
                  • Source File: 00000001.00000002.385046170.0000000010000000.00000040.00000400.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_1_2_10000000_svchost.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: LP$TP$\1P$|*Q
                  • API String ID: 0-718270435
                  • Opcode ID: 73fc59df2933badc3a8ed5fc068dd753388fc0cd3a9b6805401d62ff910ff4f5
                  • Instruction ID: 996994430743bc7117f6a1b416f6bb2c7dbe9114d28de827433b640eee596ff5
                  • Opcode Fuzzy Hash: 73fc59df2933badc3a8ed5fc068dd753388fc0cd3a9b6805401d62ff910ff4f5
                  • Instruction Fuzzy Hash: 50E0ECBC20C6C05AF236EA69581252F779DD7897C07C18871F54896A29DD59ACA04472
                  Uniqueness

                  Uniqueness Score: -1.00%